Not to be confused with Audio Visual. AV in the IT world is Anti Virus Program. Software program designed to protect your computer or network against computer viruses.
Data Transfer bit rate. The amount of data that is transferred from one point to another in a network, in a given time period.
That's a 'bit'. The smallest unit of data in a computer.
Is a high-speed internet connection provided either at home or through your mobile. There are three different types of broadband
Cable Broadband (Fibre-Optic), Mobile Broadband (3G or 4G mobile signal) and ADSL Broadband (Telephone line)
A unit of measurement used to measure data.
Provides a temporary storage for operands and content to be accessed later. The two main types of cache are Memory cache and Disk cache.
Central Processing Unit. CPU is the primary component of a computer that processes instructions.
Cloud computing means storing and accessing data and programs over the internet instead of your computer’s hard drive.
Is a tiny little file that’s stored on your computer. It contains the address of the Website and codes that your browser sends back to the Website each time you visit.
Domain Name System. Is used to translate your IP Address into an actual name. It works extremely fast and efficiently and is an integral part of the Internet.
A group of files that enable one or more hardware devices to communicate with the computers operating system.
Is a system for connecting a number of computer systems to form a local area network to transfer data.
An Ethernet port is used to connect network equipment through an Ethernet cable. They connect wired hardware in a LAN or WAN.
External Hard Disk Drive. A portable storage device that connects to your computer via USB cable for data transfer.
Fibre Optic Cable
A cable that contains optical fibres (usually glass) coated in plastic that are used to send data by pulses of light.
A standard way the information is encoded for storage in a computer file. Each file has a different format etc. Jpeg or GIF.
Firewalls are tools that can be used to enhance the security of computers connected to a network. As network traffic passes through the firewall, it decides which traffic to forward/not forward based on rules that you have defined.
Hard Disk Drive
Stores your Data
Usually referred to as a link is an icon, graphic or object that is programmed to ‘jump-to-another-page’ in your web browser.
Hypertext Transfer Protocol. Network protocol used to deliver virtually all files and other data on the World Wide Web.
The information contained on a website is secure.
Is a company that provides access to the Internet and other related services.
An IP address is assigned to every computer on an Ethernet network. Like the street address for your home, an IP Address identifies network computers.
Joint Photographic Experts Group.
A standardised image compression mechanism. JPEG is designed for compressing either full colour or grey scale digital images of “natural” scenes. It works well on photographs, naturalistic artwork and similar material; not so well on lettering, simple cartoons or black and white drawings.
Local Area Network. A group of computers and associated devices that share a common communications line or wireless link to a server and share resources such as a printer or network storage.
Original Equipment Manufacturer. Is a single license that is the cheapest but also the strictest and cannot be transferred to another computer. The license lives and dies with the computer.
An Open License Agreement is designed for between 5 and 250 computers and usually, contains a single installation disk and a single product key. The difference, however, is that the product key may be used repeatedly until the number of acquired licenses have been reached. An OLP is a pay-as-you-go system.
A modem is a device that provides access to the internet.
Network attached storage. NAS adds more storage to your network. It is a self-contained file server that’s preconfigured and ready to run.
In computing, an operand is the part of a computer instruction which specifies what data is to be manipulated or operated on, while at the same time representing the data itself. A computer instruction describes an operation such as add or multiply X, while the operand (or operands, as there can be more than one) specify on which X to operate as well as the value of X.
Are fake emails sent out to try and trick the recipient into clicking on links or attachments and asking for personal sensitive data.
Is a software component that adds a specific feature to a program installed on your computer.
Is a connection on the front and back of your computer that allows you to connect additional devices like printers, keyboards.
Portable Document File. A file format for sending electronic documents in exactly the intended format.
A computer program is a sequences of instructions written to perform specific tasks with a computer like Microsoft Office or Photoshop.
Random Access Memory. Is a type of computer memory that can be accessed randomly. Instead of sequentially like a CD or Hard drive, the computer can access the data much faster.
A type of malicious software designed to block access to a computer system until a sum of money is paid.
A router is a small box that allows multiple computers to join the same network.
A computer program or device that provides functionality for other programs or devices, called “clients”. This architecture is called the client-server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called “services”, such as sharing data or resources among multiple clients or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device.
The programs or applications used by a computer.
Unsolicited messages sent over the internet to a large number of uses for the purpose of advertising, phishing, spreading malware etc.
Is malicious and unwanted software that can track your activities, slow your machine down and spy on what you are doing.
Storage area network is a collection of computers and storage devices connected over a high-speed optical network and dedicated to the task of storing and protecting data
Computer networking device that connects devices together on a computer network by using packet switching to receive, process and forward data to the destination device.
Uniform Resource Locator. Standardised way or naming network resources used for linking pages on the World Wide Web
A program that runs on a system against the user’s wishes or knowledge. It is designed to spread from host to host and has the ability to replicate. It can delete your data, ruin your pc and send your data to a third party.
Is a software application used to reach and explore websites.
Wide Area Network is a large communications network that consists of a collection of LANs and other networks.
Wireless Local Area Network is a wireless networking technology that uses radio waves to provide high-speed Internet and network connections.
Kilobyte = 1,024 Bytes
Megabyte = 1,024 Kilobytes
Gigabyte = 1,024 Megabytes
Terabyte = 1,024 Gigabytes
Petabyte = 1,024 Terabytes
Exabyte = 1,024 Petabytes