{"id":160,"date":"2025-08-14T11:48:49","date_gmt":"2025-08-14T11:48:49","guid":{"rendered":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/?post_type=back-matter&#038;p=160"},"modified":"2025-08-14T11:48:49","modified_gmt":"2025-08-14T11:48:49","slug":"glossary-of-terms","status":"publish","type":"back-matter","link":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/back-matter\/glossary-of-terms\/","title":{"raw":"Glossary of Terms","rendered":"Glossary of Terms"},"content":{"raw":"","rendered":"<dl data-type=\"glossary\">\n<dt data-type=\"glossterm\"><dfn id=\"dfn-acceptable-use-policy-aup\">Acceptable Use Policy (AUP)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A document that outlines the rules for the use of a company's computers and networks.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-accuracy\">Accuracy<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The ability of a computer to perform calculations with 100% accuracy, which is critical for financial tasks<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-antivirus-programs\">Antivirus Programs<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Software that detects and removes viruses and other malware.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-application-app\">Application (app)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A set of instructions that tells a computer how to perform a specific task. The word \u201capp\u201d is more common for software on smartphones and modern computers.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-application-aoftware\">Application Aoftware<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A program designed for a user to perform a specific task, like writing a document or browsing the internet.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-artificial-intelligence-ai\">Artificial Intelligence (AI)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A broad field of computer science focused on creating machines and software that can perform tasks requiring human intelligence, such as learning, problem-solving, and understanding language.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-authentication\">Authentication<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The process of verifying a user's identity to ensure they are who they claim to be.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-automation\">Automation<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The use of technology to perform tasks with reduced human assistance.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-backup\">Backup<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A copy of files made for safety in case the originals are lost or damaged.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-bandwidth\">Bandwidth<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The measure of how much data can be transferred over a connection in a specific amount of time, usually measured in Mbps.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-big-data\">Big Data<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Extremely large and complex data sets that can be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-biometrics\">Biometrics<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The use of a unique personal characteristic, like a fingerprint or facial scan, for identification.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-bit\">Bit<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The smallest unit of data in a computer, represented as either ON (1) or OFF (0).<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-blockchain\">Blockchain<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A secure, decentralized, and distributed digital ledger technology that records transactions in a way that is highly resistant to modification.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-bluetooth\">Bluetooth<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A short-range wireless technology for connecting personal devices together over a range of about 10 meters.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-browser\">Browser<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The software application used to access and view webpages on the World Wide Web (e.g., Google Chrome, Safari).<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-byte\">Byte<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A unit of digital information that consists of 8 bits. A group of 8 bits is called a byte, which can represent a single character.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-central-processing-unit-or-cpu\">Central Processing Unit, or CPU<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Figure 3.4: A Mobile User Interface. The screen of a smartphone provides a clear example of a modern Graphical User Interface (GUI). The grid of small pictures, or icons, allows the user to launch applications with a simple touch.<br \/>\n(Image generated with AI assistance.)<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-client\">Client<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A computer or device that requests information from a server.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-cloud-backup\">Cloud Backup<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An internet service for storing data on remote servers as backup.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-cloud-computing\">Cloud Computing<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The delivery of on-demand computing services\u2014including servers, storage, databases, and software\u2014over the internet from a cloud provider.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-cloud-storage\">Cloud Storage<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A service that stores your data on internet servers, allowing you to access it from any device with an internet connection.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-computer\">Computer<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An electronic device that operates under the control of instructions to process raw items and produce a useful result. It processes data based on a set of instructions.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-continuous-learning\">Continuous Learning<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The ongoing, voluntary, and self-motivated pursuit of knowledge for either personal or professional reasons.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-cryptocurrency\">Cryptocurrency<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A digital or virtual currency that uses cryptography for security, with Bitcoin being the most well-known example.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-cybercrime\">Cybercrime<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An illegal act involving a computer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-cybersecurity\">Cybersecurity<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The practice of protecting computers, networks, and data from attack, damage, or unauthorized access.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-data\">Data<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The raw details you provide to the computer. They are raw, unprocessed facts and figures.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-data-analytics\">Data Analytics<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The process of examining large data sets to find trends, draw conclusions, and make informed decisions.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-decision-making\">Decision-making<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The process of using computer-analyzed information to make smarter business choices.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-desktop-computer\">Desktop Computer<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A computer designed to stay in one location, which is often more powerful and easier to upgrade than portable models.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-digital-divide\">Digital Divide<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The gap between people who have ready access to computers and the internet, and those who do not.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-digital-security-risks\">Digital Security Risks<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Any event or action that could cause loss or damage to a computer system or its data<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-digital-skills-gap\">Digital Skills Gap<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The difference between the digital skills that employers need and the skills that the current workforce possesses.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-display\">Display<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The most common output device, which visually presents text, graphics, and video on a screen.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-domain-name-system-dns\">Domain Name System (DNS)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The internet's phonebook, which translates human-readable domain names (like google.com) into computer-readable IP addresses.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-e-waste\">E-waste<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Discarded electronic equipment, such as old computers, smartphones, and printers.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-embedded-computer\">Embedded Computer<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A special-purpose computer that functions as one component within a larger product, such as a rice cooker or a car's braking system.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-encryption\">Encryption<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The process of converting readable data (plaintext) into an unreadable, scrambled code (ciphertext) to protect it.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-enterprise-user\">Enterprise user<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An employee who works for a large organisation on a managed company network, often using specialized, custom-built software.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-ergonomics\">Ergonomics<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The science of designing a workspace and its equipment to be safe, comfortable, and efficient for human use.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-executes\">Executes<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>To carry out the instructions of a computer program.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-file\">File<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A named collection of stored data, which can be thought of as a single digital item.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-file-manager\">File Manager<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A utility that helps users manage their files and folders.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-firewall\">Firewall<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Hardware or software that acts as a security guard to protect a network from unauthorized access.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-folder\">Folder<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A digital container used to organise files.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-fragmentation\">fragmentation<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The state of a file being stored in separate, non-contiguous parts on a disk.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-gigabyte\">Gigabyte<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A unit of data measurement approximately equal to 1 billion bytes.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-green-computing\">Green Computing<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The practice of using computing resources in a more environmentally responsible and sustainable way.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-hard-disk-drive-hdd\">Hard Disk Drive (HDD)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A traditional storage device that uses magnetism and spinning platters to store data permanently.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-hardware\">Hardware<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The physical, touchable parts of a computer system.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-headset\">Headset<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A device that combines headphones (output) and a microphone (input) into a single unit, commonly used for online calls.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-home-user\">Home user<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A person who uses a computer for personal activities at home, such as managing personal life, entertainment, and learning.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-hotspot\">Hotspot<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A physical location where you can get wireless internet access. A mobile hotspot uses a smartphone's data connection.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-https\">HTTPS<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A protocol that indicates a secure and encrypted connection to a website, often shown by a padlock icon in the browser.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-information\">Information<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The final, organized result that the computer shows you. It is processed data that is meaningful and useful.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-input\">Input<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The act of providing data and instructions to the computer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-input-device\">Input Device<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Any piece of hardware used to enter data and instructions into a computer, such as a keyboard or mouse.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-instructions\">Instructions<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A set of specific rules a computer follows to perform any task.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-internet\">Internet<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The massive, worldwide collection of interconnected computer networks that share information.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-internet-of-things-iot\">Internet of Things (IoT)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A vast network of physical devices (not just computers) that are embedded with sensors and connected to the internet, allowing them to collect and share data.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-internet-service-provider-isp\">Internet Service Provider (ISP)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A business that provides access to the internet (e.g., TM Unifi, Maxis).<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-ip-address\">IP Address<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A unique number that identifies each computer or device connected to the internet.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-ipos\">IPOS<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The four-step cycle of Input, Process, Output, and Storage.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-keyboard\">Keyboard<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The most common input device, used for typing text, numbers, and symbols.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-kilobyte\">Kilobyte<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A unit of data measurement approximately equal to 1,000 bytes.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-laptop\">Laptop<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A portable, all-in-one computer that combines the screen, keyboard, and internal parts into a single unit for mobility.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-malware\">Malware<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Short for \"malicious software,\" it is any software intentionally designed to cause damage to a computer or steal data.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-megabyte\">Megabyte<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A unit of data measurement approximately equal to 1 million bytes.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-memory-card\">Memory Card<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A small, flat storage card that uses flash memory, commonly used in portable devices like digital cameras and smartphones.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-microphone\">Microphone<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An input device that captures sound waves and converts them into a digital format.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-mobile-app\">Mobile App<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A native application designed specifically to be installed and run on a mobile device like a smartphone or tablet.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-mobile-user\">Mobile user<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A professional who works while on the move, relying on portable devices like smartphones and tablets to stay connected and productive.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-mouse\">Mouse<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The most common pointing device for desktop computers, used to control the cursor on the screen.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-multitasking\">Multitasking<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The ability of an operating system to run multiple applications at the same time, sharing the computer's resources among them.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-native-app\">Native App<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A program that is installed directly onto a specific computer or mobile device.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-netiquette\">Netiquette<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The code of acceptable and polite behavior for online communication.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-network\">Network<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A collection of computers and devices connected together, which allows them to share resources.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-nfc-near-field-communication\">NFC (Near Field Communication)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A very short-range wireless technology (4 cm or less) that powers \"tap-to-pay\" systems.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-open-source-software\">Open-Source Software<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Software where the source code is made available for free, allowing anyone to view, modify, and share it.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-operating-system\">Operating System<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The main system software that manages all the computer's hardware and software resources.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-operating-system-os\">Operating System (OS)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The main system software that manages a computer's hardware and software resources.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-output\">Output<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The result that a computer shows after processing data.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-output-device\">Output Device<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Any hardware component that presents the processed information from a computer to a user, such as a monitor or printer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-phishing\">Phishing<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A common cyberattack where hackers send fake emails, pretending to be from a legitimate company, to trick people into revealing personal information or downloading malware.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-port\">Port<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A connection point or interface on a computer where you can connect an external device.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-power-user\">Power user<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A user who requires a high-performance computer for demanding and specialized tasks, such as 3D modelling or scientific calculations.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-printer\">Printer<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An output device that produces a physical copy (\"hard copy\") of text and graphics.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-process\">Process<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The action of the computer taking raw data and following instructions to work on it.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-program\">Program<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A set of instructions that tells the hardware what to do. It is also known as software.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-programming-language\">Programming Language<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A formal language used to write instructions for a computer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-random-access-memory-ram\">Random Access Memory (RAM)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The computer's high-speed, temporary, and volatile workspace that holds data and instructions the CPU is actively using.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-random-access-memory-or-ram\">Random Access Memory, or RAM<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Temporary storage for data and programs that are currently in use. It is volatile.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-ransomware\">Ransomware<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A type of malware that encrypts a user's files and demands a ransom payment to unlock them.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-reach\">Reach<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The ability of a business to connect with customers and partners globally through the internet.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-resolution\">Resolution<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The number of individual dots, or pixels, used to create the image on a screen, which determines the sharpness and clarity.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-restore\">Restore<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The process of copying files from a backup back to their original location.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-retail-software\">Retail Software<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Mass-produced software that is available for purchase in a store or online.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-scanner\">Scanner<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An input device that converts printed material, such as text and pictures, into a digital format.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-server\">Server<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A powerful computer that provides services to other computers over a network.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-software\">Software<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A set of instructions (a program) that tells the hardware what to do.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-software-developers\">Software Developers<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A group of people who write computer programs.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-software-development-life-cycle-sdlc\">Software Development Life Cycle (SDLC)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A structured process that professionals follow for planning, creating, testing, and maintaining software.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-software-license\">Software License<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A legal agreement that defines how a piece of software can be used and distributed.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-software-piracy\">Software Piracy<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The illegal and unauthorized copying, distribution, or use of copyrighted software<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-software-update\">Software Update<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A new version of a program that can fix errors, improve security, and add new features.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-soho-user\">SOHO User<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An individual who runs a business from home or a small office, using a computer as their primary tool for earning an income.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-solid-state-drive-ssd\">Solid-State Drive (SSD)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A modern and fast storage device that stores data on flash memory chips and has no moving parts.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-speed\">Speed<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The ability of a computer to process millions of instructions every second, which translates into business efficiency and better customer service.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-spyware\">Spyware<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Software that secretly collects information about a user's activities.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-storage\">Storage<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The act of saving data or information for future use.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-surge-protector\">Surge Protector<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A device that protects computer equipment against electrical power spikes.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-system-software\">System Software<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The set of programs that operates and controls the computer's hardware and provides a platform for applications to run.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-tablet\">Tablet<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A highly portable mobile computer with a large touch screen as its main feature.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-terabyte\">Terabyte<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A unit of data measurement approximately equal to 1 trillion bytes.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-trojan-horse\">Trojan Horse<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Destructive software that is disguised as a legitimate, useful program.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-two-step-verification\">Two-Step Verification<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A security method that requires two different forms of identification to log in.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-uninterruptible-power-supply-ups\">Uninterruptible Power Supply (UPS)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A device that contains a battery and provides temporary power during a blackout, allowing for a safe shutdown.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-url-uniform-resource-locator\">URL (Uniform Resource Locator)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A webpage's unique address.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-usb-flash-drive\">USB Flash Drive<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A small, ultra-portable storage device that plugs into a USB port, also known as a thumb drive or pendrive.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-use\">Use<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>Anyone who interacts with a computer or mobile device.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-user-interface\">User Interface<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The visual part of a program or device that a user interacts with.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-user-interface-ui\">User Interface (UI)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>The visual part of an operating system or software that a user interacts with, including the desktop, icons, and menus.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-utility\">Utility<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A program that performs a specific task related to managing or maintaining a computer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-utility-program\">Utility Program<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A type of system software that performs a specific maintenance task to help manage, protect, or improve the computer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-virtual-private-network-vpn\">Virtual Private Network (VPN)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A service that provides a secure, encrypted connection over a public network like the internet.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-virus\">Virus<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A malicious program that attaches itself to a file to spread.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-voip-voice-over-ip\">VoIP (Voice over IP)<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A technology that allows you to make voice calls over the internet instead of a traditional phone line.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-web-app\">Web App<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>An application that runs on a remote server and is accessed through a web browser, so nothing needs to be installed on the user's computer.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-webcam\">Webcam<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A small digital video camera used to capture video for online meetings, classes, or video calls.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-wi-fi\">Wi-Fi<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A wireless technology that uses radio signals to provide high-speed internet and network connections over a large area.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-world-wide-web\">World Wide Web<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A system of public, interlinked documents and other web resources that are accessed via the internet.<\/p>\n<\/dd>\n<dt data-type=\"glossterm\"><dfn id=\"dfn-worm\">Worm<\/dfn><\/dt>\n<dd data-type=\"glossdef\">\n<p>A malicious program that can copy itself to spread across a network without human interaction.<\/p>\n<\/dd>\n<\/dl>\n","protected":false},"author":91,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"back-matter-type":[38],"contributor":[],"license":[],"class_list":["post-160","back-matter","type-back-matter","status-publish","hentry","back-matter-type-glossary"],"_links":{"self":[{"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/pressbooks\/v2\/back-matter\/160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/pressbooks\/v2\/back-matter"}],"about":[{"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/wp\/v2\/types\/back-matter"}],"author":[{"embeddable":true,"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/wp\/v2\/users\/91"}],"version-history":[{"count":1,"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/pressbooks\/v2\/back-matter\/160\/revisions"}],"predecessor-version":[{"id":161,"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/pressbooks\/v2\/back-matter\/160\/revisions\/161"}],"metadata":[{"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/pressbooks\/v2\/back-matter\/160\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/wp\/v2\/media?parent=160"}],"wp:term":[{"taxonomy":"back-matter-type","embeddable":true,"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/pressbooks\/v2\/back-matter-type?post=160"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/wp\/v2\/contributor?post=160"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/openbook.ums.edu.my\/businessbytescomputerguide\/wp-json\/wp\/v2\/license?post=160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}