TECHNOLOGICAL TERMS FOR ENGLISH VOCABULARY

 




 

Technological terms which we tend to use in our daily language and during interview session would enhance our knowledge and give impetus to use the etymology of particular subject.

for example we have some words relate to career and employment especially IT sector when we are at cusp of facing tech rounds in session we come across do you know the term.....viz

so let we see some words which wre predominantly used in computer technology.

.1 Ad hoc network

An ad hoc network is a type of local area network (LAN) that you can build spontaneously without using a wireless router or access point to connect two or more wireless devices. This means it 's a single-use network that doesn't support an ongoing connection. An example is a connection between your phone's hotspot and a friend's computer.

2. Affiliate marketing

Affiliate marketing is a strategy in which a company offers incentives to third-party affiliates to sell the company's products on its website or social media channel. The affiliate markets the company's products by running banner ads, text ads or posting affiliate links on its websites and social media platforms. Clicking on these text ads and links redirects clients to the e-commerce site. This site credits the affiliate account with a commission when clients purchase the products.

3 Assistive technology

Assistive technology is any software or hardware you can use to help people who have various disabilities. Assistive technology products can include wheelchairs, prosthetics or text-to-speech technology. The primary function of these products is to improve how well people can function and act independently to promote their well-being.

 Authentication
Authentication is how companies verify a person's identity or device before allowing them to access network systems. This cybersecurity strategy can protect an organization's sensitive information from unofficial access. The three main authentication factors are knowledge factors, such as passwords and other confidential login details, possession factors, such as an access card or key fob, and inherent factors, such as fingerprints.

 Back-end
Back-end refers to any process that software or applications perform that doesn't affect a user's experience, meaning it isn't visible to the user. You can store and access most data and operating syntax from the back end of a computer system. For example, a website encrypts your credit card data in the back end of the checkout page, and that information isn't visible to third parties.

Computer-aided design (CAD)
Computer-aided design is the use of computer software to aid in creating, modifying and optimizing designs. Architects, construction managers, product designers and graphic designers often use this software to create precise images before building a final product. This software saves time and resources by speeding the design process and allowing you to make changes and fix design errors virtually before creating the final product.


Cloud computing
Cloud computing refers to the delivery of various services using the internet. It provides users with an alternative data storage method, which they can use to store information on a remote database, rather than on hard drives and local storage devices. This can allow users to access information from wherever they are by using their electronic devices.


Cookie
A cookie is a piece of data a web server sends to a browser. It comprises unique identifiers web servers can use to remember you, your preferences and online browsing patterns. This allows the server to customize advertisements and other internet content to your preferences to provide a more satisfactory user experience.

 Central processing unit (CPU)
A central processing unit is a computer's main processor or the piece of hardware in a computer that performs the functions and calculations to present its user experience. It's the primary component of a computer that processes instructions. A CPU runs operating systems and applications by continuously receiving input for users and active software programs and displaying output on the computer screens.



Digital file sharing (DFS)
A DFS system is a program you can install on multiple computers to share and enable access to files between them. It can also organize and display files on different computers like they're in one place. You can set up a public or private system, depending on the organization's needs and preferences.


11. Emulation
In technology, emulation is when you use a system to imitate another system. You can achieve this using hardware, software or a combination of the two, but many people use software because it's often cheaper to replicate. For example, when you're using an operating system that doesn't suit your computer hardware, you can run an emulation software to have the unusual software imitate one your hardware can recognize.

Encryption
Encryption is the process of converting data into a code that's hard to decipher, which helps keep the data private. Encryption converts human-readable plain text to incomprehensible text, known as ciphertext, using cryptographic keys. It involves scrambling data, so only official parties can understand the information.


 End user
An end user is the intended user of a piece of software or hardware. They're customers who interact directly with various software and technological tools to accomplish individual or organizational tasks. Designers or engineers refer to the end user when clarifying the purpose of their product and how it can help them.

 Malware
Malware is a term for malicious software unethical hackers use for illegal access or to harm a system. They can include viruses, spyware, adware and ransomware. Organizations can hire cybersecurity professionals, such as ethical hackers and penetration testers, to develop security systems that can identify and protect computer systems against malware.

  1. Bit: This term is the smallest unit of measurement in computing.

  2. Boolean operator: This term refers to a simple term word that combines or excludes keywords in a search.

  3. Bounce back: This refers to an automated message informing the sender that their message is undeliverable.

  4. Breadcrumbs: These are navigation aids that improve the user experience on a web page.

  5. Browser: A browser is a software program that allows users to access the Internet.

  6. Bug: A bug represents an error in software coding that prevents a program from working.

  7. Cache: This is where a computer stores information from a web page to make it easier to access.

  8. Compression: Compression is the shrinking of a data file so it takes up less disk space.

  9. Content: This refers to the text or the elements on a web page that users can observe.

  10. Cross-platform: This refers to the ability of a program to run on multiple devices.

  11. CSS: CSS, or cascading style sheets, is a computing language that programmers can use to stylize elements written in a computer markup language like HTML.

  12. Click-through rate: The click-through rate is the number of users who click on a link over a certain period of time.

  13. Data mining: This is the process of analyzing large data collections for patterns or trends.

  14. Data visualization: Data visualization is the process of representing information using charts, graphics and other visual elements. 

  15. DevOps: This is a software development process that combines software development with IT operations to improve the development life cycle. 

  16. Domain: A domain is the location of a given website.

  17. Embed: This is the process of linking to another web page or inserting an image or a video within the text on a web page. 

  18. Framework: This is a tool that offers software developers basic functionality to accelerate the software development process. 

  19. Gateway: A gateway is hardware or software that transmits data from one location to another.

  20. GIF: This is an acronym for graphics interchange format, which is an animated image file.

  21. Homepage: This is the first page of a website that a user visits after clicking on the link.

  22. HTML: This is an acronym for hypertext markup language, which Internet browsers use to determine how to display information. 

  23. HHTP: This is an acronym for hypertext transfer protocol, and it helps load web pages using hypertext links. 

  24. Impressions: This is the number of times users interact with a video, article or another piece of online content.

  25. Keywords: These are the phrases search engines use to locate online content. 

  26. JPEG: This is a file type that displays images online. 

  27. LAN: This is an acronym for local area network, which is a network with a limited geographical range.

  28. Object-oriented programming: This programming paradigm or methodology models software based on data rather than functions. 

  29. Operating system: This refers to the system the computer uses to perform all its basic functions.

  30. Phishing: This term refers to fraudulent or unauthorized emails from scammers trying to gain confidential information from a user. 

  31. SaaS: SaaS or software-as-a-service is any type of software that operates on a subscription model.

  32. Search engine marketing (SEM): This is a type of marketing that involves using advertising to improve the visibility of a website in search engine results. 

  33. Server: A server represents the software and hardware that uses HTTP to respond to client requests over the web. 

  34. Text editor: This is a type of software that programmers use to edit plain text files. 

  35. Traffic: This is the number of users who visit a given website. 

  36. Unzip: This is the process of taking a compressed file and expanding it to its original size.

  37. URL: This is a term for a website's unique identifier. 

  38. User experience: User experience represents an application's ease of use.

  39. User interface: User interface represents the elements of an application that a user can interact with, such as the display and menus. 

  40. Virus: A virus is a computer program that causes disruptions to a system by modifying other computer programs and inserting its own code.

  41. VPN: This is an acronym for virtual private network, which is a service that creates a secure, protected Internet connection for users on a public network. 

  42. WiFi: WiFi is a group of wireless network protocols that allow users to access the Internet.

  43. Zip: This refers to the process of compressing a large file so that it uses less memory.


Comments

Popular posts from this blog

WORDS OFTEN CONFUSED

Degree 1st year 1-sem ULYSSES alfred lord tennyson

IF" poetry By Rudyard Kipling