Information Technology Jargon Buster

Jargon Buster Question Mark Featured Image

In this post I am going to explain, some of the most common terms that are used within IT (Information Technology). So here is my own jargon buster,which I hope will help you understand  the following technology jargon.

Algorithm:- Mathematics is used to create a set of instructions to solve a problem through a set of rules.

Authentication:- Is a process of  authenticating a users, own identity through a unique username and password, which is only known to them and the server they are authenticating with.

Authorization:- Is to grant access to a resource based on the authentication information that the user provides to the resource, this would be there unique username and password.

Accounting:- Accounting provides logging of a users use of a resource once authorization has been granted. Accounting is achieved through monitoring things like, the time the user spent using the resource as well as what material they might have accessed at that time.

Bandwidth:- The gap between the highest and lowest frequencies employed by network.  More commonly, it refers to the rated throughput (speed) capacity of a network medium. Think the speed of your home broadband connection.

Binary:- A two-character numbering method that uses ones and zeros. The binary numbering system underlies all digital representation of information.

Bit:- One binary digit; either a 1 or a 0. Eight bits make a byte.

Byte:- Eight bits.

DHCP Dynamic Host Configuration Protocol:- Servers are used to dynamically configure clients with network configuration details such as an IP and MAC addresses, which are used to connect to the Internet.

DNS Domain Name System:- Are used to resolve hostnames to IP addresses.

An example would be http://www.google.co.uk hostname which is resolved to the IP address of  213.123.253.29

Encryption:- The conversion of information into a scrambled form that effectively disguises it to prevent unauthorized access. Every encryption scheme uses some well-defined algorithm, which is reversed at the receiving end by an opposite algorithm in a process known as decryption.

Firewall:- A barrier purposefully erected between any connected public networks (Internet) and a private network (Home Network). That uses access lists and other methods to ensure the security of the private network.

Internet:- The global “network of networks, madeup of computer platforms and technologies.

IP Address:- Often called an Internet address, this is an address uniquely identifying any device (Host) on the Internet. Examples of an IP address 213.123.253.29

LAN Local Area Network:- Any network linking two or more computers and related devices within a limited geographical area up to a few kilometres, An example of a LAN is your home network.

Latency:- Is the time it takes a data packet to get from one location to another.

MAC Address:- A hardware address that every port on a device needs in order to connect to a Local Network or Internet. Examples of an MAC address 08:00:69:02:01:FC

Node / Host / Client:- Is a electronic device such as a PC, Laptop, Smartphone, Server, Tablet or TV, they become network nodes / host or client, when connected to the Internet.

Packet:- The basic logical unit of information transferred over the Internet is called a packet.

PGP:- Pretty Good Privacy: A popular public-key / private-key encryption application offering protected transfer of files and messages. PGP can be used with email and or instant messaging programs.

Ping Packet Internet Groper:- Is an internet diagnostic tool consisting of a message sent to test the accessibility of a particular device on a Local Network or the Internet.

QoS Quality Of Service:- A set of metrics used to measure the quality of transmission and service availability of any given transmission system.

Redundancy:- In networking, the duplication of connections, devices, or services that can be used as a backup in the event that the primary connections, devices, or services fail.

Router:- Is hardware that uses software, to decide on the best path to use for transmission of network traffic.

Server:- Hardware and software that provide network services (cloud services) to clients.

Spooler:- A management application that processes requests submitted to it, for execution in a sequential fashion from a queue. A good example is a print spooler, the queue that is created by the printer when multiple print jobs are to be printed.

Subnet Address:- The portion of an IP address that is specifically identified by the subnet mask. An example would be 255.255.255.0

TCP/IP:- Transmission Control Protocol / Internet Protocol. The suite of protocols underlying the Internet which enable it to function.

VPN Virtual Private Network:- A method of encrypting point-to-point connections across a public network, such as the Internet. This allows secure communications across a public network.

WAN Wide Area Network:- Example of a WAN is the Internet.

WiFi:- Is a wireless network technology that is used to send electronic data across a wireless communication medium.

I will be adding new terms to this post in the future, so please feel free to bookmark it.

Please also take the time to have a look at the support plans and services I have on offer.

You can also follow me on Twitter & Facebook

Thanks for your time.

Advertisements

Author: Adam Farnsworth

Welcome to my blog My Name is Adam Farnsworth. I am the owner of Remote PC Services. My blog will cover all areas of the IT industry, as well as any thing that interests me within the technology world. Thanks for taking the time to read my posts.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s