If you’re new to IT and still learning, it might be daunting to read through articles without knowing what any of the words mean. Here we have compiled a list of IT terms that you should add to your flashcards.
4G, 5G, LTE
4G, 5G and LTE are cellphone network speeds.
Agile is a project management term that means to continually improve through small and digestible increments.
An algorithm is a sequence of instructions used to perform a task in software.
Artificial Intelligence (AI)
Artificial intelligence (AI), is a term used to describe computers’ aptitude to mimic human abilities such as reasoning, knowledge representation, planning, learning, natural language processing, perception, robotics, social intelligence and general intelligence.
Assembly language is a low-level programming language that communicates with the hardware of a computer.
Attenuation is the loss of signal strength in networking cables or connections. It may cause signals to become distorted or indiscernible.
Augmented Reality (AR)
Augmented Reality (AR) uses a device placed between the person and their environment to provide an enhanced version of their surroundings by providing virtual elements in the field of vision.
Automation is the technique of using software or scripting to perform a specific process or task without manual input. Automation often frees up knowledge workers from routine tasks but still requires oversight to ensure proper operation.
Autonomous vehicles can operate and sense their surroundings without human involvement.
Big data is a label that typically applies to extremely large and/or unstructured data sets or data sets. Many organizations have little differentiation between their approach to big data and their approach to traditional data sets.
Biometric authentication is using a person’s unique characteristics to verify their identity, including fingerprint scanning, facial recognition and voice recognition.
A blockchain is a list of records linked together using special cryptographic operations across a distributed network of computers.
In tech, blocklisting is the process of denying access to applications or other entities that might pose a threat to a network.
Bluetooth is a technology that allows devices to connect with each other over short distances without wires or cables.
A botnet is a system of devices that are infected with malware and is controlled by an attacker, sometimes used in DDoS attacks.
Central Processing Unit (CPU)
A central processing unit (CPU) is a piece of computer hardware that retrieves, stores, processes and executes instructions. Think of the CPU as the brains of the computer.
Caches are digital storage used to store temporary files that devices can use for future requests in order to run more efficiently.
Cloud computing is the model of providing virtual infrastructure or software via network connections in a way that allows more self-service and dynamic allocation. This can be done by working with a public cloud provider or building a private cloud implementation.
Computer networking is the process of linking computers together to send and receive information from each other.
Containerization is the process of isolating and maintaining an application. Everything that the application needs to run is placed inside that container. It can then be moved around regardless of the host operating system.
A cyberattack is a set of actions aimed to infiltrate computer networks, systems and personal devices.
Cybersecurity is the practice of protecting digital assets against cybercriminals, including measures such as network security, penetration testing or workforce education.
Cybersecurity compliance is the practice of adhering to standards and regulatory requirements set forth by an agency, law or authority group.
Cybersecurity engineers work to build and maintain a system that’s safe against cyberattacks. They focus on fixing and protecting these systems and staying up to date on new technology so they can keep their system secure.
A distributed denial-of-service (DDoS) attack aims to disrupt normal web traffic from accessing a site by flooding a server with internet traffic.
The dark web is a part of the internet that isn’t accessible to the general public. It can only be accessed by using special software so that users can remain anonymous.
A data analyst is someone who works with an organization’s data to assist in making better business decisions and provide insights that support decision-making efforts.
A database administrator is someone who manages all aspects of an organized database environment.
A data center is a physical server facility that securely houses critical applications, data and other digital assets.
Data visualization is the representation of data through visual elements like charts, plots, infographics, maps, etc.
Also known as unmanned aerial vehicles (UAV), drones are flying machines that are controlled remotely or can fly on their own.
Edge computing allows data to be processed as close as possible to the point of creation.
Embedded development is when manufacturers place software or code into products that consumers use every day.
Encryption is the process of concealing private information by converting digital information into something that can only be read with a key related to the type of conversion.
Front End Developer
Graphics Processing Unit (GPU)
A graphics processing unit (GPU) is a piece of computer hardware that renders graphics on a device.
High-definition Multimedia Interface (HDMI)
Short for high-definition multimedia interface, HDMI digitally transmits video and audio data from one source to another.
Incident Response Plan
An incident response plan is a combination of people, process and technology that is documented, tested and trained toward in the event of a security breach. The purpose of the incident response plan is to prevent data and monetary loss and to resume normal operations.
Information Technology (IT)
Information technology (IT) is the development and use of computer systems and networks to store, manage or retrieve information.
Infrastructure as a Service (IaaS)
Infrastructure as a service (IaaS) is a type of cloud computing that provides access to storage, servers, memory, etc.
Internet of Things (IOT)
Internet of Things (IOT) refers to systems of internet-connected devices that provide computing capability. These devices are different from traditional computers and can provide intelligence to everyday objects.
An IP address is a string of numbers used to identify devices on the internet or network.
IT Project Manager
An IT project manager is someone who sets timelines for technical projects and keeps the team on task and on budget.
IT Support Specialist
Local Area Network (LAN)
A local area network (LAN) consists of a series of computers linked together to form a network in a relatively contained location, such as a home or office building.
Linux is an open-source operating system used extensively in IT infrastructure. Linux is technically a family of different variations, known as distributions, all based on the same core code, known as the Linux kernel.
Machine learning is a form of artificial intelligence that allows software to learn patterns based on sample data.
Malware refers to any software that is intended to threaten or compromise information or systems.
Managed Service Provider (MSP)
A managed service provider (MSP) is an IT business that has the skills, expertise and experience to implement and manage technology solutions that help their clients’ businesses achieve peak performance.
Near-field Communication (NFC)
Near-field communication (NFC) is a short-range and contactless form of communication that allows devices to communicate with each other.
Network administrators are IT pros that support an organization’s internal servers by installing, maintaining and monitoring systems.
Network segmentation is the process of dividing a computer network into separate network zones by using devices like bridges, switches and routers.
Next-generation Firewalls (NGFWs)
Next-generation firewalls (NGFWs) are network security devices that provide complete application control and visibility and are more sophisticated than traditional firewalls.
Open-source software has code that can be modified and seen by anyone. What developers are allowed to do with it afterward depends on the specific open-source license that is used.
Operating systems connect computer hardware to applications and manages all memory and processes. Some examples include Linux, Apple macOS and Microsoft Windows.
Passive Optical Network (PON)
A passive optical network (PON) is used by telecommunications network providers to allow a single fiber from a service provider the ability to maintain an efficient broadband connection for multiple end users.
Penetration testing is the process of attacking a network in order to assess the strength of the network’s cybersecurity defenses.
Phishing attacks use email, phone or text to get someone to provide sensitive information such as passwords and credit card information.
Platform as a Service (PaaS)
Platform as a service (PaaS) is a cloud computing service that uses virtualization to offer an application-development platform to developers or organizations. This platform includes computing, memory, storage, database and other app development services. PaaS solutions can be used to develop software for internal use or offered for sale.
A programming language is a set of rules or instructions that are used to create software applications.
A QA analyst is someone who uses quality assurance techniques to detect errors in a software product or process.
Random Access Memory (RAM)
Random access memory (RAM) is a form of computer storage that can be rewritten multiple times.
Ransomware is a type of malware that encrypts your data so that attackers can demand a ransom in exchange for giving your access back.
A Raspberry Pi is a credit card sized computer that brings programming capabilities and computing power to people all over the world.
A security architect is someone who develops and maintains the security of an organization’s network. They also collaborate with business leaders, engineers, developers and more to protect an organization from cyber threats.
Security Operations Center (SOC)
A security operations center (SOC) can refer to the team of experts that monitor an organization’s ability to operate securely. It can also refer to the location of the physical equipment used for monitoring.
Social engineering is the method of gaining the trust of a user so that the attacker can acquire sensitive information that can be used to access data.
Software as a Service (SaaS)
Software as a Service (SaaS) is the method of delivering applications or software via the internet so that it can be easily accessed by anyone that is connected to the internet.
Spoofing is when cybercriminals use deception to appear as another person or source of information.
Steganography is the practice of hiding a secret message inside of something that is not a secret with the purpose of concealing and deceiving.
A systems administrator is someone who implements and maintains backend IT infrastructure such as servers and networks.
Threat hunting is the process of mitigating cyber threats before they attack an organization.
Threat detection is the process of finding malicious activity on your network.
Troubleshooting is the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods.
UI/UX designers are individuals who research the behavior and preferences of consumers in order to develop and test design models that make products easier for people to use.
Virtualization is the process of creating copies of computing resources such as servers or storage. Multiple copies can be created on a single piece of physical hardware, allowing for more flexibility in operations.
Virtual Private Network (VPN)
A virtual private network
, is an extension of a private network over public resources, using dedicated hardware
or software to create the extension and securely transmit data.
Virtual Reality (VR)
Virtual reality (VR) is using computer-simulated three-dimensional environments to provide the user with an immersive and interactive experience.
Vulnerability assessment is the process of discovering and analyzing vulnerabilities and penetration testing is the process of exploiting those vulnerabilities to help determine the best mitigation technique.
Web developers are individuals responsible for both the design and look of a website as well as the site’s technical aspects such as performance and capacity, which are metrics of a website’s speed and traffic.
Wide Area Network (WAN)
A wide area network (WAN) is a large network of information and data that is not tied to a single location.
Zero trust is an overarching model of cybersecurity that forces verification of users and data at every level rather than assuming that the source of the information can be trusted.