Computer Glossary (P–Z)

yellow and black printed textile

📘 Computer Glossary (P–Z)

P

  • Packet: A small unit of data transmitted over a network.

  • Parallel Processing: Running multiple processes at the same time.

  • Partition: A section of a hard drive treated as a separate unit.

  • Password: A secret code used for authentication.

  • Patch: A software update that fixes bugs or security issues.

  • Peer-to-Peer (P2P): A network where computers share resources directly.

  • Peripherals: External devices connected to a computer (e.g., keyboard, mouse).

  • Phishing: A cyberattack tricking users into giving sensitive data.

  • Ping: A command to test connectivity between devices.

  • Pixel: The smallest unit of a digital image.

  • Plug-in: A small add-on that extends software functionality.

  • Port: A communication endpoint in networking or hardware.

  • Post (Power-On Self-Test): A diagnostic test when a computer starts.

  • Proxy Server: A server that acts as an intermediary for requests.

  • Python: A popular high-level programming language.

Q

  • Query: A request for data from a database.

  • Queue: A list of tasks waiting to be processed.

  • QuickTime: Apple’s multimedia framework for handling video and audio.

  • QoS (Quality of Service): Network feature that prioritizes certain traffic.

  • Quantum Computing: Advanced computing based on quantum mechanics.

R

  • RAID (Redundant Array of Independent Disks): A system for combining multiple drives.

  • RAM (Random Access Memory): Temporary memory used for active processes.

  • Raster Graphics: Images made up of pixels.

  • Reboot: Restarting a computer.

  • Registry: A database of settings in Windows.

  • Resolution: The number of pixels in a display.

  • Restore Point: A saved system state for recovery.

  • Router: A device that directs data between networks.

  • Runtime: The environment where a program runs.

S

  • SAN (Storage Area Network): A high-speed network of storage devices.

  • SaaS (Software as a Service): Cloud software delivered over the internet.

  • Scalability: The ability of a system to handle growth.

  • Script: A small program that automates tasks.

  • Search Engine: A tool to find information on the internet.

  • Server: A computer that provides services to others.

  • Shareware: Software distributed for free with limited features.

  • Shell: A program that interprets user commands.

  • SMTP (Simple Mail Transfer Protocol): A protocol for sending emails.

  • SNMP (Simple Network Management Protocol): Used for monitoring networks.

  • SQL (Structured Query Language): A language for managing databases.

  • SSD (Solid State Drive): Fast storage device using flash memory.

  • Stack: A data structure or set of software components.

  • Spyware: Malicious software that secretly collects data.

  • Switch: A network device that connects multiple devices.

T

  • TCP/IP: The core communication protocol of the internet.

  • Terabyte (TB): A unit of storage equal to about 1 trillion bytes.

  • Terminal: A text-based interface for interacting with a computer.

  • Token: A digital key for authentication.

  • Trojan Horse: Malware disguised as legitimate software.

  • Troubleshooting: Identifying and fixing computer problems.

  • Tunnel: A secure path for transmitting data over a network.

  • Two-Factor Authentication (2FA): An extra step for verifying identity.

U

  • UI (User Interface): The visual part of a computer system.

  • UDP (User Datagram Protocol): A fast, connectionless communication protocol.

  • Unicode: A character encoding standard for text.

  • Uninstall: Removing software from a computer.

  • Upload: Sending data from a local device to a server.

  • URL (Uniform Resource Locator): The address of a webpage.

  • USB (Universal Serial Bus): A standard for connecting devices.

  • Utility Software: Programs that help manage a computer.

V

  • Virtual Machine (VM): Software that simulates a physical computer.

  • Virus: Malicious software that spreads between computers.

  • VPN (Virtual Private Network): A secure connection over the internet.

  • VR (Virtual Reality): Computer-generated 3D immersive environments.

  • Vulnerability: A weakness that can be exploited in a system.

W

  • WAN (Wide Area Network): A large-scale network across cities or countries.

  • Wallpaper: The background image of a computer desktop.

  • Wearable Tech: Smart devices worn on the body.

  • Web Browser: Software for accessing the internet.

  • Web Hosting: Providing storage for websites.

  • Wi-Fi: A wireless networking technology.

  • Wiki: A collaborative website that can be edited by users.

  • Windows: A popular operating system by Microsoft.

  • Worm: Malware that spreads without user action.

X

  • XHTML (Extensible Hypertext Markup Language): A stricter version of HTML.

  • XML (Extensible Markup Language): A format for structuring and transporting data.

  • XSS (Cross-Site Scripting): A type of web security vulnerability.

Y

  • Y2K (Year 2000 Problem): A computer bug related to date formatting.

  • YAML (YAML Ain’t Markup Language): A human-friendly data format.

  • Yield: A programming keyword that pauses and resumes functions.

Z

  • Zero-Day Exploit: An attack on a software flaw unknown to the vendor.

  • Zip File: A compressed file format.

  • Zombie Computer: A hacked computer controlled remotely.

  • Zettabyte (ZB): A unit of digital information equal to 1 billion terabytes.