Explore a comprehensive computer dictionary featuring all computer-related terms. Here you can search various keyword related to computer science, such as programming languages, data structures, algorithms, operating systems, databases, and more.
Keyword | Description |
---|---|
Access Control | Deals with policies and mechanism to prohibit a user/process from accessing ant resource that he/she is not authourised to access |
Adder | A logic circuit capable of calculating the sum of two or more quantities. |
Algorithm | A step-by-step procedure or formula for solving a problem or accomplishing a task in computer science. |
Alpha testing | After completion of integrated testing of software, it is released for further testing to a very select user group within or outside the organisation. |
ANSI | American Standard Code for Information Interchange - A US based national organization that establishes uniform standard in several field. |
Analog computer | A computer that operates on data, which is in the form of continously variable physical quantities such as electrical current. |
Animation | A multimedia component that contain a set of images displayed at a reasonable speed to create an effect of visual change or motion, similar to a movie film. |
Archiving | Organization and interconnection of various components of a computer system. |
Array | A data type that is collection of elements in which all elements are of the same type. It has a fixed number of elements, called its length or size, given at the time of its declaration. |
Artificial Intelligence | A branch of computer science that deals with possessing, reasoning, learning and thinking capabilities of computers thar resemble those of human beings. |
Assembler | A computer program that translate an assembly language program to its machine language equivalent. |
Assembly language | A programming language that allow instruction and storage location to be represented by letters and symbol instead of number. |
Authentication | Process by which a system verifies the identity of a user befor it permits the user to access a requested resources. |
Authorization | Once a system authenticate a user / process successfully, the system should next have ways to prohibit the user/process from accessing those resources/information that he/she is not authorized to access. This issue is called authorization. |
Backup | Alternate facilities of programs, data file, hardware equipment, etc. Which are used in case the original one is destroyed, lost or fails to operate. |
Bandwidth | Range of frequencies available for data transmission. Wider the bandwidth of a communication system the more data it can transmit in a given period. |
Batch processing | Running of several computer programs one after another without the need of a huma operator to run each program individually. |
Beta Testing | Use of beta version of software by a selected group of users for identifying errors that might have been overlooked during regular testing phase. |
Binary | A number system based on two digits 0 and 1, used by computers to represent data and perform operations. |
Biometric device | A device used for user authentication that verifies some physical characteristic of a user such as the person apperance, fingerprint, hand geometry, voice or signature. |
Bit | It stand for Binary Digit 0 or 1 |
Bluetooth | A wireless technology standard used for exchanging data over short distances. |
Booting | Process of automation loading of operating system to primary storage, and readying a computer system for use. |
Browser | Software tool that provide several navigation facilities to help user to internet suffering easily and effectively. |
Bug | A error in a computer program |
Bus | A set of wires, which carries |
Cloud Computing | The delivery of computing services (such as servers, storage, databases, networking, software) over the internet (the cloud) to offer faster innovation, flexible resources, and economies of scale. |
CPU | Central Processing Unit, the primary component of a computer that performs instructions. |
Data Mining | The process of discovering patterns and extracting knowledge from large amounts of data using algorithms and techniques from statistics, machine learning, and database systems. |
DNS | Domain Name System, a system that translates domain names to IP addresses. |
Encryption | The process of encoding information in such a way that only authorized parties can access it. |
Ethernet | A common method of networking computers in a LAN (Local Area Network). |
Firmware | Software that is embedded into hardware devices, providing low-level control over the devices functionality. |
Firewall | A security system that monitors and controls incoming and outgoing network traffic. |
GUI | Graphical User Interface, a visual way of interacting with a computer using icons, menus, and other graphical elements. |
HTML | Hypertext Markup Language, the standard markup language for creating web pages. |
HTTP | Hypertext Transfer Protocol, the foundation of data communication for the World Wide Web. |
IoT | Internet of Things, a network of physical objects (devices, vehicles, appliances) embedded with sensors, software, and connectivity to enable them to collect and exchange data. |
ISP | Internet Service Provider, a company that provides access to the internet. |
JavaScript | A high-level programming language used primarily to create dynamic and interactive effects within web browsers. |
Kernel | The core component of an operating system that manages system resources and provides the lowest-level abstraction layer for hardware. |
Laptop | A portable computer. |
Linux | A family of open-source Unix-like operating systems based on the Linux kernel. |
Machine Learning | A subset of artificial intelligence that enables systems to learn and improve from experience without being explicitly programmed. |
Malware | Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. |
Network Protocol | A set of rules governing communication between devices over a network. |
OpenGL | Open Graphics Library, a cross-language, cross-platform API for rendering 2D and 3D vector graphics. |
Packet | A formatted unit of data carried by a packet-switched network. |
Python | A high-level programming language known for its readability and simplicity, used for web development, data analysis, artificial intelligence, and more. |
RAM | Random Access Memory, a type of computer memory that can be accessed randomly. |
Regression | A statistical technique used in machine learning and data analysis to model the relationship between variables. |
Router | A device that forwards data packets between computer networks. |
Server | A computer or system that provides resources, data, or services to other computers, known as clients, over a network. |
Solid State Drive (SSD) | A storage device that uses integrated circuit assemblies to store data persistently. |
SQL | Structured Query Language, a domain-specific language used in programming and managing relational databases. |
TCP/IP | Transmission Control Protocol/Internet Protocol, the fundamental suite of protocols that powers the internet and network communication. |
Unicode | A computing industry standard for consistent encoding, representation, and handling of text expressed in most of the world writing systems. |
Virtualization | The creation of a virtual (rather than actual) version of something, such as a virtual machine, operating system, storage device, or network resource. |
Virtual Private Network (VPN) | A secure connection between a user and a private network over the internet. |
Web Server | A software application that serves web pages to clients over the internet. |
XML | Extensible Markup Language, a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. |