Throughout the articles on this site and in other articles about technology, you will encounter many tech-specific terms, the knowledge of which is necessary to understand the meaning of the article. Instead of going back to college to get a computer science degree**, you can read this article, where I have compiled many of the most important terms to add to your lexicon.
*Mostly***
**This article is intended to help normal people understand tech. It is not a substitute for a computer science degree. The author of this article does not have a computer science degree. The author of this article does not encourage the use of this dictionary as a replacement for actual education. If you are seeking employment in the technology sector, you should acquire a degree in computer science in addition to reading this article.
***As of July 2023
A cyber attack that exploits a vulnerability not yet known to the public or the software vendor. Often used to steal sensitive information or launch other malicious attacks.
Indicates the size of the transistors (in nanometers) on a computer chip. 5Nm is the current standard* but will soon be replaced by 3Nm.
A program that mimics human intelligence and is capable of producing outputs not specifically programmed into it.
A piece of code that allows someone, usually the developer or a government, to access a device or software without using normal login channels.
A measure of processor performance, determined by a benchmark software such as Geekbench.
A heavily encrypted decentralized database, often used to store financial transactions and crypto.
A unit of data equal to 8 bits. Often found in other forms: KB (1,000 bytes), MB (1,000,000 bytes), GB (1,000,000,000 bytes), etc.
A measure of CPU speed, measured in operations per second (GHz).
Online computing services operating on an external server, such as data storage, computing power, and software applications, that can be accessed remotely.
Central Processing Unit. The processor of a computer or other smart device.
Digital money.
A section of the internet where websites are heavily encrypted and traffic is anonymous. Mostly used by hackers and criminals, though legitimate sites and users can also be found there.
(Distributed Denial of Service) An attack where hackers send large amounts of fake traffic to a server(s) in order to cause them to crash.
The name of a website (eg. google.com).
The process of converting information into a secure form so that only authorized people can access it.
A security vulnerability used by hackers to gain access to devices or applications to install malware.
Code embedded in the components of a device that allows them to function.
A type of artificial intelligence capable of generating content, such as text or images, using machine learning.
Graphics Processing Unit. Also known as a graphics card, this chip controls graphics on a device.
Graphical User Interface. Any software that has an interface other than a command prompt terminal.
A component that stores data such as files and applications. Also referred to as storage or a Solid State Drive (SSD).
Integrated Development Environment. Application used to develop code.
A unique number that identifies a device on a computer network. It is assigned by an Internet Service Provider (ISP) and is used to route data to and from the device.
Large Language Model. AIs like ChatGPT, Bing, and Google Bard.
A method for training AI systems by providing training data and allowing the system to teach itself.
Nefarious software used by hackers to access devices, steal data and login credentials, mine cryptocurrency, and track and control infected devices.
The circuit board that holds the important components of a computer, such as the CPU, GPU, memory, and hard drive.
The software that controls a device (eg. Windows, iOS, Android)
The most common cause of tech issues. (Problem Between Chair And Keyboard)
An attack where hackers send a link posing as a friend, relative, or company which, once accessed, installs malware.
Random Access Memory. This is like short-term memory for computers. It helps with calculations and running software.
A type of malware that is used to hold devices or data stored on devices for ransom.
The code that controls a piece of software.
Malware used to spy on the owner of a device.
A Virtual Private Network (VPN) encrypts internet traffic and masks IP address, granting increased privacy and security.
*As of time of writing
This dictionary was published on July 16, 2023 under General Knowledge. Last updated 07.16.2023