Skip to content
Step by Step Internet 🌐 Guides for learning to surf the Net

Computer Glossary: ​​What are the most important concepts you should know?

UPDATED ✅ Do you want to know about the most important concepts to learn Computer Science? ⭐ ENTER HERE ⭐ and Learn Everything FROM ZERO!

At this point it is impossible to deny that computing is one of the sciences that has the greatest impact on our lives. It’s amazing how we’ve become so dependent on it in less than a century.

The importance of information technology is reflected in every digital advance that has allowed us to make our lives as easy as possible,yes how to stay connected instantly no matter how far we are from our listener.

If you are very interested in this science, then you will know the most important concepts and terms of itso that you know each and every one of them in detail.

What is computer science and what are its characteristics? Concept and definition

What are the fundamental terms and concepts of computer science?



Although it is complex to compress everything that computer science does for humanity, in brief, the concept that best fits is: science that studies the ways of collecting, storing, processing and transmitting information in an automated way.

To make it, an engineer uses apparatus (hardware) and combines it with commands (software) that execute the tasks necessary to fulfill the functions of computing. In this article you will find a complete list of terms that you need to know to better understand everything that this science does to make everyday life easier.

What are the fundamental terms and concepts of computer science?

What is a hyperlink and what is it for in computing and the Internet?

In this section we leave you the main terms that you should know and that will help you when talking to your personal technician and understand how much he explains to you what is wrong with your desktop or laptop computer. And if you plan to study Computer Engineering or Informatics, This is a necessary guide that you should have on hand.

Computer system

When the collection, storage, processing and transmission of information depends almost entirely on computers, then we speak of a computer system. Human resources are essential in any computer systemWell, every computer requires data to be entered into your system via input devices like keyboards and mice.

Once the data is entered, the computer does almost everything on its own and eventually triggers hundreds of other systems or the cycle ends in output devices such as printers, projectors, speakers, or CD or DVD burners.

computers or computers

It depends on the country you are in, it is called a computer (Latin America) or computers (Europe). It is a machine that processes orders to perform endless tasks that make human life easier. It is one of the most popular inventions in history and is constantly evolving. As the programs (software) advance, they demand more capacities than the devices (hardware) Why do you think there is always a smartphone of the year?

programs

It is one or more computer programs that execute tasks within a computer system. They are activities previously programmed by a human resource and according to some values, they choose to do one or another specific action. Web pages are programmed in several languages, smartphones in another specific language and computers too They have their own programming language.

Operating system

It is a system that brings together hundreds of programs that manage the different components of a computer or any electronic equipment, such as televisions, washing machines and state-of-the-art vehicles. It is in charge of managing the fast and permanent memory, of correctly distributing the processing of the activities and of channeling all the orders that you do every moment. To avoid crashing, this system distributes the tasks in the foreground and background, depending on what you are doing at that moment.

Hardware

It is the tangible of a computer system: RAM memory, hard drive, processor, USB port. The by themselves do not work, that is where the work of the programs or software comes in. Interestingly, the term was first used late 16th century when referring to metal and resistant objects in the hardware industry. In the 1940s, it became essential to distinguish between physical and intangible components.

Software

It is the intangible in an operating system, the orders written by a human resource to be executed. Programs use a specific language depending on where they work. By itself, the programs also do not work. It is as if you spoke only with the oral cords. It would be impossible! You also need the tongue, the teeth and the lips.

There are positive and beneficial programs for humanity. Is it so computer virusesworms, spyware, adware, and Trojans. They are programs that 80% are intended for the Windows operating system.

Complete list of computing concepts you should know

Now you will know a complete glossary of what you need to know to be a computer expert:

A B. C D AND F G H Yo J K L M N EITHER P Q R yes T OR v W X Y Z

A

DHW

Is a Access Control List (ACS) and has various functions such as limiting network traffic to improve performance and generates a basic level of security to enter a network. It also allows you to filter data traffic, for example, if you want email to take priority over social media. Finally, it allows and denies access to the different network services.

ADSL

It is a protocol for transmitting digital data. and access the Internet. Its use stems from the use of the same cable that you use to make phone calls and now to connect to a network. To make it work, there must be an active telephone line and with a modulation system that separates the voice frequency from the navigation data.

Bandwidth

It is confused with the speed of the Internet connection. Bandwidth is the amount of data that can be sent over a connection., in a given period. If you have several computers and cell phones connected in your home and office, you will surely need more bandwidth.

client/server agent

When we talk about a client, it can actually be one or several, everyone has the power to make inquiries and request the services of a server. A server is a data repository and must handle the various requests from clients. The final purpose is to maintain a communication between one or several stations with the clients that access the data.

ARP

This protocol is important for transmitting data on Ethernet networks: first because IP packets can only be sent with the help of an address hardware to destination hosts, but cannot receive physical addresses on its own. The ARP protocol has its own caching mechanism that makes it easy to obtain physical addresses.

ASCII

It is a standard and American code of information exchange. It is used to convert a character naturally by means of clear rules and that it belongs to another kind of system with meanings. His ultimate goal is facilitate the storage and processing of information on a computer.

ATM

It’s a Asynchronous Transfer Mode which arises from the need to transfer large files at a high speed. It establishes two types of connections: Permanent virtual connections, in which it is performed by end mechanisms through the network manager. Y switched virtual connections in which the connections are made with a signaling protocol automatically.

B.

Broadband

They are the methods in which two or more signals share a single transmission channel. It is the sending of symmetrical data of several packets of information. The broadband directly affects the speed with which data is sent on a networksince it establishes the limit of information that can be transported simultaneously by it.

Binary

In computers, numbers are represented only by the digits one and zero. With this system, computers work at their most primitive level, with two voltage levels. Binary refers to any system that is made up of two parts, two signs, or any other pair..

BIOS

is a small application installed on the motherboard of every computer, where all the options for this board are configured. It is one of the most basic input and output systems, which locates the operating system and loads it into RAM.

BIT

It is the smallest unit that can be transmitted. His presence represents an electronic imposition. A byte is eight continuous bits. It is also the basic measure for memory, storing the equivalent of a character.

bits per second

Network administrators measure by the bpsBit per Second, the data speed on a network connection. As network speeds increase, it becomes easier to name them in thousands (kilo), millions (mega), or billions (giga) of units.

Bluetooth

Bluetooth is a short-range radio wave communication technology for low-energy devices. that appears in the year 1994. This allows the transfer of information (both voice and data) between devices over short distances. For this, uses a radio frequency link which occurs, initially, in the ISM band, at 2.4 GHz.

Bug

is spanish means “insect”, it’s annoying error or defect in a computer program that causes execution to fail and its operation. The term was used by Thomas Edison to refer to a bug in his inventions.

Byte

It is the equivalent of 8 bits (Binary Digit). It began to be used by Werner Buchholz, in 1957. This measure is only used in computing and telecommunications. Most data in computing is measured in bytes, except for the data transmission speed of a network, which is expressed in bits. In this sense, the units of bytes are always expressed with an uppercase letter B, while bits are expressed with a lowercase b.

C

Coaxial cable

It is used to transmit data and has two conductors separated by a layer of dielectric insulation. It was created for facilitate high frequency transmission and protect the transmission of electromagnetic transfers.

cookies

Its usefulness is linked to Internet browsing. They are small text files that are stored locally and contain personalized data from a client or user. Contrary to what you think, they are not used to store personal identity data of users.

codec

It is a term related to video and audio, is a program that compresses and processes video and audio data to be transmitted and received by a decoder. A good codec guarantees maximum quality during audio and video playback at a low weight of said file.

D

DHCP

It is what allows the operation of the Internet on your computer to be simpler, faster and quieter. It is a dynamic host configuration protocol that assigns IP addresses and applies other parameters that allow a connection.

IP Address (Internet Protocol Address)

It is the unique address that a server or computer has. The same happens on the Internet, there is an identification for each network device or server. At this level, IP addresses are just a bunch of numbers that are difficult for the end user to memorize.


It is a domain name system, thought more for the end user, since it gives a name (domain) and extensions to the web pages. Since there are classic IP addresses like “216.58.217.36” and alphanumeric addresses like “2400:cb00:2048:1::c629:d7a2”, imagine memorizing this to visit a website. That is why it is easier to set a name that will be easier to remember.

DSL

It is a connectivity solution that uses alternative frequency spectrums for voice transmission. It is used to differentiate between two independent channels on a telephone line.it is even used to talk on the phone and surf the Internet at the same time.

DSLAM

It is useful to differentiate channels in a single transmission medium. Separate the voice frequency from the one used for the Internet. And it allows any equipment to connect to the provider’s fiber optic network.

Domain Name

It is a system of databases distributed among several servers, translate classic alphanumeric IP addresses into words the end user can use. There are hierarchies and each site should be responsible for keeping their domain information up to date.

AND

EEPROM

It is a memory designed for repetitive use, that is, programmed information is erased and reused. This technology was developed at Intel, and was thought to protect data in the event of an electrical failure that forced the computer to be turned off.

EEPROM

We are talking about a chip read-only memory that is programmable and electrically erasable. The difference with the EPROM is that it retains the data without the need to be connected to a power source. It is a technology that used in vehicle manufacturing that require some computer system.

Ethernet

It is a network of computers connected to each other locally. Namely, computers that share folders without the need to be on the Internet. It is a local network and linked by a cable. It began to be used in the 70’s.

F

Optical fiber

It is used for data networks and telecommunications. It is a material to transmit information and data at high speed, without the intermittencies that a point-to-point connection through an antenna entails. Pulses of light carry data back and forth at a speed similar to that of radio. Only electromagnetic interference affects communications.

Firewall

It is a program that monitors network traffic to detect worm attacks, malware and hacker attacks. It is just a first line of defense and has been used for more than 20 years. It is a barrier between internal or local networks and external networks.

firmware

It is similar to an operating system, but with less capacity. It is a portion of commands that tell the hardware what to do.. Firmware is what They used low-end phones for their operation before the boom of the smartphones and last generation.

FTP

It is a file transfer protocol, It is based on the client/server concept.. It is mainly used to connect to a web server and upload the structure of a page. Although it offers convenience and speed in transferring files, it does not offer much security. With the help of a small computer program, the client tells this “app” which files to transfer and place them in which folders.

H

HTML



Contrary to what you think, it is not a programming language. They are markup tags that when invoked follow a very simple instruction. With them you apply color, size, font type to the texts, manage size, location and alternative text in an image. What is its impact on the world? What was the first tool that popularized the use of the Internet, the first web pages were made with these tags. In itself, it only allows you to indicate the order of the content on a website.

HTTP

It is the protocol that is currently used for the computer where you are and the computer where the web page you want to see is hosted can communicate. It was Developed in 1999 by the World Wide Web Consortiumcollaboration with the Internet Engineering Task Force. With it, criteria are established to give shape and meaning to the communication necessary to navigate.

HTTPS

HTTPS refers to an application protocol that is intended for the secure transfer of hypertext data and is based on the HTTP protocol, but it is the “secure” version of this. Thus, it consists of a protocol that offers the possibility of establish a reliable connection between the client and the server in order to avoid any interception by unauthorized persons.

HUB or Concentrator

It is a device used to concentrate the cables of a network and expand its power or range. The hub transmits the received packets to a different port. It is a technology that is little used anymore. since the “switches” are the successors of the hub.

Yo

ICMP (Internet Control Message Protocol)

Is a implementation of the IP protocol to return messages detailing problems and datagram errors to the sender of the packet. Current servers use this protocol. Its sixth version was identified in RFC 4443.

IGMP (Internet Group Management Protocol)

It is a protocol that facilitates the sending of data in large quantities. It is what used by companies like Netflix or YouTube to cover the high demand for bandwidth. Without this support, they would have to send these excessive amounts of data to the millions of users they have in parts.

Internet

Perhaps it is the most used word since the 90s. It is a gigantic network of computers linked together to share information. It is a decentralized network with a global reach that offers a wide variety of servicesincluding email and mass file storage, known today as the “Cloud”. Its creation dates after the Cold War, the fall of the Berlin Wall and the Soviet Unionwhen military research pointed to communications being maintained in the event of a war.

website

It is a network of computers and servers that serve as the Internet, but limited to a physical space and more corporate purposes. The main clients are companies that seek to gather services and support to workers without the need to use the Internet. If you know how to use it, it improves productivity at work, saves costs when knowing people’s opinion and facilitates internal processes.. In the best of cases, it allows for collaborative and shared work.

ISP (Internet Service Provider)

They are companies that provide Internet service, it is the term with which identify brands that sell Internet access to households and other businesses. Online shopping, mailing, Google searches and watching movies would not be possible without a proper and legal connection.

L

LAN

They are local connection areas that work with routers, which in turn have three or four LAN ports. They allow, among other things, through a cable you can have Internet on your computer or laptop. In the LAN ports you connect printers, PCs, NAS servers and any other device that needs to be connected by a network cable.

M

MAC

It’s a unique identifier that each manufacturer gives to the network card of its connected devices. Cell phones, printers, televisions and other equipment have a network card and this is a series of numbers assigned to it.

Subnet mask

It is one of the tools that every programmer has to configure a network. With her the routing process of the routers is facilitated, since the identification of the network to which they belong is better analyzed. It also checks the destination host to return the requested data.

Mbps Megabits per second

It is a way of measuring the data that is transmitted over a network connection and equal to 1,000 kilobits per second or what is equal to 1,000,000 bits. It is a data transfer rate, it is the way you have to know how much a file weighs and how long it will take to complete its upload or download.

Modem

It is a computer that receives the data from the Internet provider and distributes it to the different home devices that you want to be connected to the Internet. It is short for modulator and demodulator.this because converts analog signals into digital signals. Its function is to translate the data that is sent and received.

P

P2P

Although there is a recent boom in its use, it is actually one of the oldest forms of communication. It appeared after the first personal computers were manufactured. “Per to Peer” is a transfer of data from person to person, point to point without intermediaries. A central server is not required, as instant messaging applications do.

PLC

It is a device that is programmed to do actions automatically. It was thought so that tasks that are dangerous in humans can be carried out by machines.. Its use is mainly industrial, so brands save labor in some cases.

PCMCIA

They were designed to add memory to personal computers and laptops. Currently its use is intended for many other devices. In addition to increasing RAM memory, they are used in devices such as modems and FAX cards.

POP

It is a way to access your email that uses the memory of the device to save the messages and read them whenever you want. In principle, you do not need to be connected all the time, only when you need to access a lot of information and send data. Before the arrival of smartphones, it was used in low-end mobiles to access the email service.

PPP

This protocol offers a standard method for carrying datagrams over point-to-point links. There is a component to encrypt the datagrams, a link control protocol to test the connection between the two, and various protocols to configure network layers.

PTP

It is an image transfer protocol that is used in Windows and Mac operating systems. used to copy images from a camera or cell phone to the computer quickly and safely. Often it is only necessary to connect the camera to the computer to start the transfer, in older equipment it was necessary to install a driver or driver.

Protocol

They are a set of rules that guide communication between two or more computer systems. They are programming languages ​​that synchronize actions and recover errors between these systems.

proxy

It is a program that allows access to the Internet instead of another computer. It is like an intermediary between the computer and the network connection. It is a mistake to think that the computer makes immediate access to a website, in reality the computer makes the request to the server through the Proxy.

R

Router or Router

It is a device that allows multiple networks to connect to each other and use the same Internet connection. Find the shortest and safest way to send and receive data. This is just one of the uses, as it also allows several devices in your home to have access to the same Internet connection.

yes

SMTP

It is a protocol for the simple transfer of mail., that is, regulations that make it possible to circulate data in a network. As there are certain technical restrictions for the use of mail, one protocol is used to send data and another protocol to receive information. Allows a client to communicate with the mail server.

Socket

It’s a endpoint in the bidirectional communication channel between the server end and the data receiving program. It facilitates the operation of programs and benefits programmers because with little manipulation to the socket, they manage to make the transport of messages work on a network.

switch

It is a device that allows the interconnection of equipment to a local network or Ethernet. Dozens of cables come out of this equipment, which in turn reach each computer. of a company and thus share folders and files.

T

TPC

It works to find out how devices on the network should transmit your data in an effective way. Is a series of protocols such as the Internet protocol familybeing one of the most important tools to generate correct transmissions.

TCP/IP

It is a network model to facilitate access to the Internet. It was developed in the 1970s by Vinton Cerf and Robert Kahn when the ARPANET was created.. It is a model that guarantees a point-to-point connection and establishes how the data is formatted, transmitted and routed.

telnet

It is used to access a computer remotely, it is also a network protocol that the client implements and accesses a remote workstation. It allows to solve bugs remotely, make remote consultations or start a session with a machine UNIX. one of the big problems you have is securitythere are no filters or powerful barriers that prevent an attacker from achieving their goal.

tethering

Tethering is the mechanism by which a mobile device can share the Internet and act like a modem either router to other phones and computers. In this way it is possible to have a wireless or cable mobile network. To carry out this process, use the WiFi, Bluetooth to a USB cable.

tunneling

It’s a communication protocol that allows data to be passed from one point to another privately, through a public network. It consists of encapsulating and masking data so that it appears to be part of a public network, when in fact it is confidential and private information.

v

vpn

In this case, it is an encryption protocol so that data traffic is done securely. The VPN prevents third parties from viewing and stealing sensitive information. The connection is made through the Internet, although through a network that uses one or several computers. Companies use technology for their workers to access corporate resources considered highly confidential, so a VPN connection is preferable to the use of business emails. VPN comes from the English meaning Virtual Private Network.

W

WAN (Wide Area Network)

The difference with other networks is that this is a large scale covering several countries wherever they are. They are not networks that come directly to a home computer, they are connect to other networks such as LAN (Local Area Networks) and MAN (Metropolitan Area Networks). For this reason only large companies use this technology. As a curious fact, the largest WAN network in the known world is the Internet.

WWW (World Wide Web)

We must understand that the Internet is not the same as the World Wide Web. The “WWW” is just one of the networks that make up the great atmosphere of the Internet. The web is endless pages of information that are connected to each other, all over the world. In them there are texts, images, audio, video and now live broadcasts.

It is what we access when we enter our browser and manage to enter a google searchfor instance. Absolutely all the content that is on the web can be located through search engines, unless the programmer tells these search engines that he does not want to be indexed. This network was created by Tim Berners-Lee who said what were all the elements required in principle to start browsing in a sea of ​​content that was locatable for the end user.

Computing