SlideShare a Scribd company logo
Computer Science Terms Need To know About
Have you ever spent time with a group of computers or IT
professionals talking about the store? Terms like "LAN",
"RAM" and "bandwidth" entered the conversation and you had
no idea what that meant. It can be a little intimidating to hear
all that tech jargon thrown around. But don't let a small
language barrier stop you from enrolling in
computer science terms
.
Just because you're new to the game doesn't mean you need to
be left out of the conversation. With a little preparation, you
can impress your classmates on the first day of school with your
computer know-how.
To get you started, we've compiled this basic list of computer
terms you should decode before setting foot in class. Brush up
on this common vocabulary and you'll be up to speed with your
tech friends' conversations in no time.
25 computer terms you need to know
Each industry has its own jargon, and computing is no
exception. Become familiar with these 25 computer terms to
impress your classmates and teachers from day one.
1. Analog
Analog technology is any part of the technology that does its
job without processing numbers electronically like a computer
does. You might think of analog as "old school" technology,
like movie cameras or tape recorders.
2. Bandwidth
This term refers to the amount of information that can be
transmitted or processed, wirelessly or over a wired connection.
Internet services will advertise high speeds measured in
bandwidth, so it is a well known component of the IT world.
3. Big data
Big data is a quick way to refer to the huge amounts of data that
companies collect on a daily basis. Businesses face a number of
big data management challenges, especially when it comes to
analytics and security.
4. Bit
Bit stands for "binary binary", the smallest piece of information
used by a computer. Each piece is 1 or 0, which are binary
numbers that make up a computer language. Pieces are literally
the foundation on which computing is built. Because they are so
small, computer wizards require basic technology to think of
pieces on a larger scale:
Byte = 8 beats
Kilobytes = 1024 bytes
Megabytes = 1024 kilobytes
Gigabytes = 1024 megabytes
5. Bugs
A bug is a programming error that causes wisdom or unexpected
problems for the end user of a program.
6. Cloud storage
Cloud storage is another way to store data in the physical
memory of a computer. Information stored "in the cloud" is
stored on remote servers that can be accessed anywhere over the
Internet.
7. Code
Code refers to various programming languages used to create,
modify or manage computer programs or applications. Most
computer science students specialize in a handful of
programming languages depending on the career they would like
to pursue.
8. Control panel
Just as it sounds, the control panel is a tool that allows you to
change or modify the program's settings as it looks or behaves.
9. CPU
CPU stands for Central Processing Unit, which is a processing
chip and "brain" of the computer.
10. Data security
This is the process of protecting data from unauthorized users
or hackers.
11. Debug
Debugging refers to the process of finding and removing errors
from the source code of a program. The goal is for programmers
to discover and fix bugs before their end user has problems.
12. Digital
Digital technology is the opposite of analog. It is anything that
uses a computer's binary language to do its job. Digitizing
something means converting analog data into digital data that
can be used by a computer.
13. Archiving to disk
Disk storage refers to your computer hard drive or long-term
memory. This is where a computer stores information that is not
being used at that time. If disk storage becomes too full, a
computer could slow down as it takes some time to wade
through all that data.
14. Ethernet
Ethernet is similar to the Internet. It is a system that connects
multiple computers or devices to the same network, enabling
fast and monitored data transmission. Ethereal networks have
limited network access managed by a handful of sysadmins,
making it a secure networking solution for many businesses.
15. Hacker
This term can refer to an experienced programmer. But the most
common use refers to someone who can gain unauthorized
access to, or "hack into," other computers or networks. IT
specialists can get the qualifications to become a certified
ethical hacker.
16. HTML
HTML stands for Hypertext Markup Language. HTML is a
coding language used to write Internet-based documents, such
as websites. It is one of the basic programming languages that
you will most likely learn early in your computer career.
17. Hub
This device is a central connection for all computers on a
network, which is generally based on Ethernet. Information sent
to the hub can go to any other computer on the network.
18. Index
An index is a list of data, such as a group of files or database
entries. It is usually saved in a plain text format so that a
computer can quickly scan it to retrieve the information it
needs.
19. IP address
Also known as "IP number" or simply "IP", it is a numerical
code that identifies a specific computer on the Internet. Think
of it as the unique social security number of a computer.
20. LAN
LAN stands for "Local Area Network". It is a small network of
computers, often located in a room. (Think of your high school
or college computer lab.)
21. Plain text
Plain text that does not support italics, underlines, bold
characters, fonts, or font sizes.
22. Processor
Also known as a microprocessor, this little chip is the heart of a
computer. The processor does all the calculations for the
computer, which means that it is responsible for every bit of
input and output that comes from the computer. Speed matters
when it comes to processors, and many can handle trillions of
calculations per second.
23. RAM
This is an acronym for Random-Access Memory, the place
where a computer stores data while it is being used or modified.
Think of it like the short-term memory of a computer. It does
not have unlimited storage, but it allows quick access to the
information you are currently using.
24. ROM
ROM stands for read-only memory. This is memory that can
only be read and cannot be written. Computers use ROM to
store important tasks such as startup processes and software
instructions.
25. Loadware
Vaporware is software advertised and sold from time to time but
not yet available. Sometimes the company is still fine-tuning
before launching a Steam software product. In some cases, a
company knows that a product doesn't exist (or won't exist for
years), but uses marketing tricks to measure interest.
Take your computing knowledge to the next level
Now that you are ready to impress these
computer science
terms, you can continue the essential conversation in the first
few courses. Most of the curriculum covers most of this
vocabulary so you can get one step ahead of your classmates.
However, not all degree programs are created equal. Find out
how our program stands out in our article: 10 Things You Didn't
Know About Rasmussen College Computer Science Programs.

More Related Content

Similar to Computer Science Terms Need To know AboutHave you ever spent.docx

Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
Jiian Francisco
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
Zo Sangpy
 
Hwswb
HwswbHwswb
Network
NetworkNetwork
Hardware
HardwareHardware
Hardware
Susheel-Jain
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
zelah marie dasmariñas-gorres
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
Zunair Aslam
 
Ite 101 presentation
Ite 101 presentationIte 101 presentation
Ite 101 presentation
vanthorn
 
Itroduction about java
Itroduction about javaItroduction about java
Itroduction about java
srmohan06
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
Makk Quak
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Digital Shende
 
C with lab
C with labC with lab
C with lab
ParveenSingh73
 
Occupational health and safety
Occupational health and safetyOccupational health and safety
Occupational health and safety
elsaobejas1
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
meharikiros2
 
Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
Dr. C.V. Suresh Babu
 
BASICS OF COMPUTERS
BASICS OF COMPUTERSBASICS OF COMPUTERS
BASICS OF COMPUTERS
Dhanuja Kumar
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
JTHSICT
 
Computer basics
Computer basicsComputer basics
Computer basics
JEEVA ARAVINTH
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
LordelynFrancoYusi
 
Nt1310 Unit 3 Pc
Nt1310 Unit 3 PcNt1310 Unit 3 Pc
Nt1310 Unit 3 Pc
Melanie Erickson
 

Similar to Computer Science Terms Need To know AboutHave you ever spent.docx (20)

Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Hwswb
HwswbHwswb
Hwswb
 
Network
NetworkNetwork
Network
 
Hardware
HardwareHardware
Hardware
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Ite 101 presentation
Ite 101 presentationIte 101 presentation
Ite 101 presentation
 
Itroduction about java
Itroduction about javaItroduction about java
Itroduction about java
 
Computer basics--computer basics2
Computer basics--computer basics2Computer basics--computer basics2
Computer basics--computer basics2
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
C with lab
C with labC with lab
C with lab
 
Occupational health and safety
Occupational health and safetyOccupational health and safety
Occupational health and safety
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
 
Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
 
BASICS OF COMPUTERS
BASICS OF COMPUTERSBASICS OF COMPUTERS
BASICS OF COMPUTERS
 
Literacy glossary
Literacy glossaryLiteracy glossary
Literacy glossary
 
Computer basics
Computer basicsComputer basics
Computer basics
 
BASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptxBASIC COMPUTER ELEMENTS.pptx
BASIC COMPUTER ELEMENTS.pptx
 
Nt1310 Unit 3 Pc
Nt1310 Unit 3 PcNt1310 Unit 3 Pc
Nt1310 Unit 3 Pc
 

More from patricke8

Concept of collection. Assume that An agency has focused its sys.docx
Concept of collection. Assume that An agency has focused its sys.docxConcept of collection. Assume that An agency has focused its sys.docx
Concept of collection. Assume that An agency has focused its sys.docx
patricke8
 
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docxConcept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
patricke8
 
Concept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docxConcept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docx
patricke8
 
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docxCONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
patricke8
 
Computer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docxComputer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docx
patricke8
 
Concept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docxConcept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docx
patricke8
 
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docxConcept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
patricke8
 
Concentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docxConcentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docx
patricke8
 
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docxConcentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
patricke8
 
Con Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docxCon Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docx
patricke8
 
COMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docxCOMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docx
patricke8
 
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docxCOMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
patricke8
 
computerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docxcomputerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docx
patricke8
 
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docxComputers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
patricke8
 
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docxComputers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
patricke8
 
Computers can be used symbolically to intimidate, deceive or defraud.docx
Computers can be used symbolically to intimidate, deceive or defraud.docxComputers can be used symbolically to intimidate, deceive or defraud.docx
Computers can be used symbolically to intimidate, deceive or defraud.docx
patricke8
 
Computers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docxComputers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docx
patricke8
 
Computers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docxComputers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docx
patricke8
 
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docxComputerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
patricke8
 
Computerized Operating Systems (OS) are almost everywhere. We en.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docxComputerized Operating Systems (OS) are almost everywhere. We en.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docx
patricke8
 

More from patricke8 (20)

Concept of collection. Assume that An agency has focused its sys.docx
Concept of collection. Assume that An agency has focused its sys.docxConcept of collection. Assume that An agency has focused its sys.docx
Concept of collection. Assume that An agency has focused its sys.docx
 
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docxConcept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
 
Concept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docxConcept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docx
 
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docxCONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
 
Computer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docxComputer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docx
 
Concept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docxConcept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docx
 
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docxConcept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
 
Concentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docxConcentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docx
 
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docxConcentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
 
Con Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docxCon Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docx
 
COMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docxCOMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docx
 
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docxCOMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
 
computerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docxcomputerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docx
 
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docxComputers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
 
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docxComputers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
 
Computers can be used symbolically to intimidate, deceive or defraud.docx
Computers can be used symbolically to intimidate, deceive or defraud.docxComputers can be used symbolically to intimidate, deceive or defraud.docx
Computers can be used symbolically to intimidate, deceive or defraud.docx
 
Computers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docxComputers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docx
 
Computers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docxComputers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docx
 
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docxComputerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
 
Computerized Operating Systems (OS) are almost everywhere. We en.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docxComputerized Operating Systems (OS) are almost everywhere. We en.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docx
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 

Computer Science Terms Need To know AboutHave you ever spent.docx

  • 1. Computer Science Terms Need To know About Have you ever spent time with a group of computers or IT professionals talking about the store? Terms like "LAN", "RAM" and "bandwidth" entered the conversation and you had no idea what that meant. It can be a little intimidating to hear all that tech jargon thrown around. But don't let a small language barrier stop you from enrolling in computer science terms . Just because you're new to the game doesn't mean you need to be left out of the conversation. With a little preparation, you can impress your classmates on the first day of school with your computer know-how. To get you started, we've compiled this basic list of computer terms you should decode before setting foot in class. Brush up on this common vocabulary and you'll be up to speed with your tech friends' conversations in no time. 25 computer terms you need to know Each industry has its own jargon, and computing is no exception. Become familiar with these 25 computer terms to impress your classmates and teachers from day one. 1. Analog Analog technology is any part of the technology that does its job without processing numbers electronically like a computer does. You might think of analog as "old school" technology, like movie cameras or tape recorders.
  • 2. 2. Bandwidth This term refers to the amount of information that can be transmitted or processed, wirelessly or over a wired connection. Internet services will advertise high speeds measured in bandwidth, so it is a well known component of the IT world. 3. Big data Big data is a quick way to refer to the huge amounts of data that companies collect on a daily basis. Businesses face a number of big data management challenges, especially when it comes to analytics and security. 4. Bit Bit stands for "binary binary", the smallest piece of information used by a computer. Each piece is 1 or 0, which are binary numbers that make up a computer language. Pieces are literally the foundation on which computing is built. Because they are so small, computer wizards require basic technology to think of pieces on a larger scale: Byte = 8 beats Kilobytes = 1024 bytes Megabytes = 1024 kilobytes Gigabytes = 1024 megabytes 5. Bugs A bug is a programming error that causes wisdom or unexpected problems for the end user of a program.
  • 3. 6. Cloud storage Cloud storage is another way to store data in the physical memory of a computer. Information stored "in the cloud" is stored on remote servers that can be accessed anywhere over the Internet. 7. Code Code refers to various programming languages used to create, modify or manage computer programs or applications. Most computer science students specialize in a handful of programming languages depending on the career they would like to pursue. 8. Control panel Just as it sounds, the control panel is a tool that allows you to change or modify the program's settings as it looks or behaves. 9. CPU CPU stands for Central Processing Unit, which is a processing chip and "brain" of the computer. 10. Data security This is the process of protecting data from unauthorized users or hackers. 11. Debug Debugging refers to the process of finding and removing errors from the source code of a program. The goal is for programmers to discover and fix bugs before their end user has problems.
  • 4. 12. Digital Digital technology is the opposite of analog. It is anything that uses a computer's binary language to do its job. Digitizing something means converting analog data into digital data that can be used by a computer. 13. Archiving to disk Disk storage refers to your computer hard drive or long-term memory. This is where a computer stores information that is not being used at that time. If disk storage becomes too full, a computer could slow down as it takes some time to wade through all that data. 14. Ethernet Ethernet is similar to the Internet. It is a system that connects multiple computers or devices to the same network, enabling fast and monitored data transmission. Ethereal networks have limited network access managed by a handful of sysadmins, making it a secure networking solution for many businesses. 15. Hacker This term can refer to an experienced programmer. But the most common use refers to someone who can gain unauthorized access to, or "hack into," other computers or networks. IT specialists can get the qualifications to become a certified ethical hacker. 16. HTML HTML stands for Hypertext Markup Language. HTML is a coding language used to write Internet-based documents, such
  • 5. as websites. It is one of the basic programming languages that you will most likely learn early in your computer career. 17. Hub This device is a central connection for all computers on a network, which is generally based on Ethernet. Information sent to the hub can go to any other computer on the network. 18. Index An index is a list of data, such as a group of files or database entries. It is usually saved in a plain text format so that a computer can quickly scan it to retrieve the information it needs. 19. IP address Also known as "IP number" or simply "IP", it is a numerical code that identifies a specific computer on the Internet. Think of it as the unique social security number of a computer. 20. LAN LAN stands for "Local Area Network". It is a small network of computers, often located in a room. (Think of your high school or college computer lab.) 21. Plain text Plain text that does not support italics, underlines, bold characters, fonts, or font sizes. 22. Processor Also known as a microprocessor, this little chip is the heart of a
  • 6. computer. The processor does all the calculations for the computer, which means that it is responsible for every bit of input and output that comes from the computer. Speed matters when it comes to processors, and many can handle trillions of calculations per second. 23. RAM This is an acronym for Random-Access Memory, the place where a computer stores data while it is being used or modified. Think of it like the short-term memory of a computer. It does not have unlimited storage, but it allows quick access to the information you are currently using. 24. ROM ROM stands for read-only memory. This is memory that can only be read and cannot be written. Computers use ROM to store important tasks such as startup processes and software instructions. 25. Loadware Vaporware is software advertised and sold from time to time but not yet available. Sometimes the company is still fine-tuning before launching a Steam software product. In some cases, a company knows that a product doesn't exist (or won't exist for years), but uses marketing tricks to measure interest. Take your computing knowledge to the next level Now that you are ready to impress these computer science terms, you can continue the essential conversation in the first few courses. Most of the curriculum covers most of this vocabulary so you can get one step ahead of your classmates.
  • 7. However, not all degree programs are created equal. Find out how our program stands out in our article: 10 Things You Didn't Know About Rasmussen College Computer Science Programs.