Computer Dictionary
Search and explore key computer science terms including programming, hardware, networking, databases, AI, and more.
Showing 494 terms
| Keyword | Description |
|---|---|
| Abstract Data Type (ADT) | A mathematical model for data types that defines behavior without implementation details (e.g., Stack, Queue). |
| Access Control | Security policies restricting unauthorized access to systems/resources (e.g., RBAC, ACL). |
| Accumulator | CPU register storing intermediate arithmetic/logic results. |
| Adder | Digital circuit performing binary addition (Half-Adder, Full-Adder). |
| Address Bus | Hardware pathway carrying memory addresses between CPU and RAM. |
| Adversarial AI | Attacks manipulating ML models (e.g., adversarial examples). |
| Agile Development | Iterative software methodology (Scrum, Kanban). |
| AJAX | Asynchronous JavaScript/XML for dynamic web content. |
| Algorithm | Step-by-step problem-solving procedure (e.g., Dijkstra’s, Quicksort). |
| Alpha Testing | Initial software testing by internal teams. |
| ALU (Arithmetic Logic Unit) | CPU component performing calculations/bitwise operations. |
| Amazon Web Services (AWS) | Cloud computing platform (EC2, S3, Lambda). |
| Analog Computer | Processes continuous data (e.g., voltage, temperature). |
| Android SDK | Toolkit for building Android apps. |
| Animation | Rapid image sequencing to simulate motion. |
| ANSI | American National Standards Institute (e.g., ANSI C). |
| API | Application Programming Interface for software interaction. |
| Applet | Small Java application running in browsers (deprecated). |
| Archiving | Long-term data storage/compression (e.g., ZIP, TAR). |
| ARP | Address Resolution Protocol (maps IP to MAC). |
| Array | Fixed-size collection of same-type elements. |
| Artificial Intelligence (AI) | Machines mimicking human intelligence (ML, NLP, Robotics). |
| Assembler | Converts assembly language to machine code. |
| Assembly Language | Low-level programming using mnemonics (e.g., MOV, ADD). |
| Asymmetric Encryption | Public-key cryptography (e.g., RSA, ECC). |
| Atomicity | Database property ensuring transactions are all-or-nothing (ACID). |
| Attribute | Data field in OOP or databases (e.g., class properties). |
| Authentication | Verifying user identity (e.g., passwords, OTP). |
| Authorization | Granting resource access post-authentication. |
| Autocomplete | UI feature predicting user input (e.g., search suggestions). |
| Automata Theory | Study of abstract machines (DFA, NFA, Turing Machines). |
| AVL Tree | Self-balancing binary search tree. |
| A* Algorithm | Pathfinding algorithm using heuristics. |
| Abstraction | Hiding complexity while exposing essentials (OOP principle). |
| Active Directory | Microsoft’s directory service for network management. |
| Actor Model | Concurrency framework (e.g., Akka, Erlang). |
| Adaptive Software | Programs adjusting behavior based on environment. |
| Adjacency Matrix | Graph representation using a 2D array. |
| Affine Transformation | Linear mapping in graphics (rotation, scaling). |
| Agent-Based Modeling | Simulating autonomous agents (e.g., traffic systems). |
| Ambient Intelligence | Smart environments reacting to human presence. |
| Apache Hadoop | Framework for distributed big data processing. |
| Augmented Reality (AR) | Overlaying digital content on real-world views. |
| Backend | The server-side part of an application that handles logic, databases, and APIs. |
| Backpropagation | An algorithm used in training neural networks to calculate gradients for weight updates. |
| Backup | The process of copying data to restore it in case of loss or corruption. |
| Bandwidth | The maximum data transfer rate of a network or internet connection, measured in bits per second (bps). |
| Base Case | The terminating condition in a recursive function that stops further recursion. |
| Batch Processing | Executing a series of jobs (data/commands) without manual intervention, often scheduled. |
| Behavioral Model | A design pattern focusing on communication between objects (e.g., Observer, Strategy). |
| Big O Notation | A mathematical notation describing the upper bound of an algorithm's time/space complexity. |
| Binary Search | An efficient O(log n) search algorithm for sorted arrays by repeatedly dividing the interval. |
| Binary Tree | A tree data structure where each node has at most two children (left and right). |
| Bit | The smallest unit of data in computing, representing a binary value (0 or 1). |
| Blockchain | A decentralized, distributed ledger technology for secure transactions (e.g., Bitcoin, Ethereum). |
| Boolean | A data type with two values: true or false. |
| Bootstrap | A front-end framework for responsive web design using HTML/CSS/JS. |
| Botnet | A network of compromised devices controlled by malware for DDoS attacks or spam. |
| Branch | A divergence in code execution (e.g., in version control or CPU pipelines). |
| Breadth-First Search (BFS) | A graph traversal algorithm exploring all neighbor nodes at the present depth before moving deeper. |
| Buffer | A temporary memory area storing data during transfer between processes/devices. |
| Bug | An error or flaw in software causing unexpected behavior. |
| Bus | A communication system transferring data between computer components (e.g., USB, PCI). |
| Byte | A unit of data equal to 8 bits, representing a single character (e.g., 'A' = 65 in ASCII). |
| Bytecode | Intermediate code executed by virtual machines (e.g., Java JVM, Python PVM). |
| Cache | A high-speed data storage layer that stores a subset of data for faster access. |
| Call Stack | A stack data structure that stores information about active subroutines in a program. |
| Compiler | A program that translates source code written in a high-level language into machine code. |
| Cryptography | The practice of secure communication techniques to protect information from adversaries. |
| CSS (Cascading Style Sheets) | A stylesheet language used to describe the presentation of a document written in HTML. |
| CPU (Central Processing Unit) | The electronic circuitry that executes instructions comprising a computer program. |
| Cloud Computing | The delivery of computing services over the internet ('the cloud') including servers, storage, databases, etc. |
| Cybersecurity | The practice of protecting systems, networks, and programs from digital attacks. |
| Concurrency | The ability of different parts or units of a program to be executed out-of-order or in partial order. |
| Cookie | A small piece of data sent from a website and stored on the user's computer by the web browser. |
| CAP Theorem | A concept that a distributed system can only provide 2 of 3 guarantees: Consistency, Availability, and Partition tolerance. |
| CI/CD (Continuous Integration/Continuous Deployment) | A method to frequently deliver apps by introducing automation into the stages of app development. |
| C++ | A general-purpose programming language created as an extension of the C programming language. |
| C# | A general-purpose, multi-paradigm programming language encompassing strong typing and object-oriented programming. |
| Command Line Interface (CLI) | A text-based interface used to interact with software and operating systems. |
| Client-Server Model | A distributed application structure that partitions tasks between providers (servers) and requesters (clients). |
| Computer Vision | A field of artificial intelligence that trains computers to interpret and understand the visual world. |
| Chatbot | A software application used to conduct an online chat conversation via text or text-to-speech. |
| Clustering | A machine learning technique that groups similar data points together. |
| Checksum | A small-sized datum derived from a block of digital data for detecting errors. |
| Cross-Platform | Software that can run on multiple computing platforms with minimal modifications. |
| Cron Job | A time-based job scheduler in Unix-like operating systems. |
| Content Delivery Network (CDN) | A geographically distributed network of proxy servers and their data centers. |
| Cyclomatic Complexity | A software metric used to indicate the complexity of a program. |
| Caching | The process of storing copies of files in a cache for quicker access. |
| Containerization | A lightweight alternative to full machine virtualization that involves encapsulating an application in a container. |
| Code Review | A systematic examination of computer source code intended to find and fix mistakes overlooked in development. |
| Cache Coherence | The uniformity of shared resource data that ends up stored in multiple local caches. |
| Closure | A function that has access to its own scope, the outer function's variables, and global variables. |
| CORS (Cross-Origin Resource Sharing) | A mechanism that allows restricted resources on a web page to be requested from another domain. |
| Cipher | An algorithm for performing encryption or decryption. |
| CRUD (Create, Read, Update, Delete) | The four basic functions of persistent storage in database applications. |
| Context Switch | The process of storing the state of a process or thread so that it can be restored and execution resumed later. |
| Continuous Integration | The practice of merging all developers' working copies to a shared mainline several times a day. |
| Cyberattack | An attempt to damage, disrupt, or gain unauthorized access to a computer system or network. |
| Caching | The process of storing copies of files in a cache for quicker access. |
| Clustering | A machine learning technique that groups similar data points together. |
| Cybernetics | The science of communications and automatic control systems in both machines and living things. |
| Code Refactoring | The process of restructuring existing computer code without changing its external behavior. |
| Convolutional Neural Network (CNN) | A class of deep neural networks, most commonly applied to analyzing visual imagery. |
| Cryptocurrency | A digital currency in which transactions are verified and records maintained by a decentralized system. |
| Cyber-Physical Systems | Systems that integrate computation, networking, and physical processes. |
| Content Management System (CMS) | A software application used to create and manage digital content. |
| Computational Complexity | A branch of computer science that focuses on classifying computational problems according to their difficulty. |
| Computer Architecture | The set of rules and methods that describe the functionality, organization, and implementation of computer systems. |
| Cyberspace | The notional environment in which communication over computer networks occurs. |
| Coding Standards | A set of guidelines for a specific programming language that recommend programming style, practices, and methods. |
| Cellular Automaton | A discrete model studied in computability theory, mathematics, physics, complexity science, theoretical biology. |
| Cyber Warfare | The use of digital attacks to attack a nation, causing comparable harm to actual warfare. |
| Code Obfuscation | The deliberate act of creating source or machine code that is difficult for humans to understand. |
| Cascading Failure | A failure in a system of interconnected parts where the failure of one part can trigger the failure of successive parts. |
| Computational Thinking | A problem-solving process that includes formulating problems, logically organizing data, and representing data through abstractions. |
| Cloud Storage | A model of computer data storage in which the digital data is stored in logical pools across multiple servers. |
| Cyber Hygiene | Basic steps and practices that users can take to improve their cybersecurity. |
| Computer Network | A set of computers connected together for the purpose of sharing resources. |
| Circuit Switching | A method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel. |
| Coding Theory | The study of the properties of codes and their fitness for a specific application. |
| Cyber Threat Intelligence | Information about threats and threat actors that helps mitigate harmful events in cyberspace. |
| Cluster Analysis | The task of grouping a set of objects in such a way that objects in the same group are more similar to each other. |
| Computational Biology | The science of using biological data to develop algorithms and models to understand biological systems. |
| Cyber Resilience | The ability of a system to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, or attacks. |
| Context-Free Grammar | A formal grammar where production rules are of the form A → α, where A is a nonterminal and α is a string of terminals and/or nonterminals. |
| Cyber-Physical Security | The protection of cyber-physical systems from malicious attacks. |
| Concurrent Computing | A form of computing in which several computations are executed during overlapping time periods. |
| Code Smell | Any characteristic in the source code of a program that possibly indicates a deeper problem. |
| Cyber Insurance | An insurance product used to protect businesses from Internet-based risks. |
| Computer Vision Syndrome | A condition resulting from focusing the eyes on a computer display for extended periods. |
| Cyber Law | The legal issues related to use of communications technology, particularly cyberspace. |
| Cloud Security | The set of policies, technologies, and controls deployed to protect data and infrastructure in cloud computing. |
| Computational Geometry | A branch of computer science devoted to the study of algorithms which can be stated in terms of geometry. |
| Cyber Espionage | The use of computer networks to gain illicit access to confidential information. |
| Contextual Bandit | A machine learning algorithm that selects actions based on contextual information. |
| Cyber Forensics | The practice of identifying, acquiring, processing, analyzing, and reporting on data stored electronically. |
| Computational Linguistics | The scientific study of language from a computational perspective. |
| Cyber Range | A virtual environment used for cybersecurity training and simulations. |
| Cognitive Computing | Systems that learn at scale, reason with purpose, and interact with humans naturally. |
| Cyber Risk Management | The process of identifying, assessing, and prioritizing risks to information and information systems. |
| Computational Neuroscience | The study of brain function in terms of the information processing properties of the structures that make up the nervous system. |
| Cyber Threat Hunting | The practice of proactively searching for cyber threats that are lurking undetected in a network. |
| Context-Aware Computing | A computing paradigm that uses context to provide relevant information and services to the user. |
| Cyber-Physical Attack | A security breach in cyberspace that impacts operations in the physical world. |
| Computational Physics | The study and implementation of numerical analysis to solve problems in physics. |
| Cyber Threat Modeling | A process by which potential threats can be identified, enumerated, and prioritized. |
| Contextual Advertising | A form of targeted advertising for advertisements appearing on websites or other media. |
| Cyber-Physical Interface | The boundary between the cyber and physical worlds where interactions occur. |
| Computational Social Science | The academic sub-discipline concerned with computational approaches to the social sciences. |
| Cyber Threat Intelligence Sharing | The exchange of information about cyber threats between organizations. |
| Contextual Inquiry | A user-centered design research method that involves observing and interviewing users in their natural environment. |
| Cyber-Physical Simulation | The simulation of systems that integrate computation, networking, and physical processes. |
| Computational Sustainability | The application of computational techniques to sustainable development. |
| Cyber Threat Intelligence Platform | A technology solution that aggregates, correlates, and analyzes threat intelligence data. |
| Contextual Design | A user-centered design process that uses contextual inquiry as its primary research method. |
| Cyber-Physical Testbed | A platform for experimenting with cyber-physical systems. |
| Computational Topology | The study of topological features of data from a computational perspective. |
| Cyber Threat Intelligence Feed | A stream of data containing information about cyber threats. |
| Contextual Bandit Problem | A machine learning problem where an algorithm must select actions based on contextual information. |
| Cyber-Physical Security Exercise | A training exercise focused on securing cyber-physical systems. |
| Computational Typology | The computational study of language typology. |
| Cyber Threat Intelligence Analyst | A professional who analyzes cyber threat intelligence data. |
| Contextual Bandit Algorithm | A machine learning algorithm that solves the contextual bandit problem. |
| Cyber-Physical Security Assessment | An evaluation of the security of a cyber-physical system. |
| Computational Verification | The use of computers to verify mathematical proofs. |
| Cyber Threat Intelligence Framework | A structured approach to collecting, analyzing, and disseminating cyber threat intelligence. |
| Contextual Bandit Model | A machine learning model that implements a contextual bandit algorithm. |
| Cyber-Physical Security Framework | A structured approach to securing cyber-physical systems. |
| Computational Virology | The use of computers to study viruses. |
| Cyber Threat Intelligence Lifecycle | The process by which cyber threat intelligence is collected, analyzed, and acted upon. |
| Contextual Bandit Problem | A machine learning problem where an algorithm must select actions based on contextual information. |
| Cyber-Physical Security Policy | A set of rules and procedures for securing cyber-physical systems. |
| Computational Vision | The use of computers to process and understand visual information. |
| Cyber Threat Intelligence Platform | A technology solution that aggregates, correlates, and analyzes threat intelligence data. |
| Contextual Bandit Solution | A method for solving the contextual bandit problem. |
| Cyber-Physical Security Standard | A set of criteria for securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Process | The steps involved in collecting, analyzing, and acting on cyber threat intelligence. |
| Contextual Bandit System | A machine learning system that implements a contextual bandit algorithm. |
| Cyber-Physical Security Training | Education and exercises focused on securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing | The exchange of information about cyber threats between organizations. |
| Contextual Bandit Technique | A method for implementing a contextual bandit algorithm. |
| Cyber-Physical Security Tool | Software or hardware used to secure cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Platform | A technology solution that facilitates the exchange of cyber threat intelligence. |
| Contextual Bandit Theory | The mathematical foundation of contextual bandit algorithms. |
| Cyber-Physical Security Vulnerability | A weakness in a cyber-physical system that could be exploited by a threat actor. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Protocol | A standardized method for exchanging cyber threat intelligence. |
| Contextual Bandit Variant | A modified version of the contextual bandit problem. |
| Cyber-Physical Security Workshop | A meeting or training session focused on securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Standard | A set of criteria for exchanging cyber threat intelligence. |
| Contextual Bandit Application | A practical use of contextual bandit algorithms. |
| Cyber-Physical Security Exercise | A training exercise focused on securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Framework | A structured approach to exchanging cyber threat intelligence. |
| Contextual Bandit Implementation | A specific way of coding a contextual bandit algorithm. |
| Cyber-Physical Security Assessment | An evaluation of the security of a cyber-physical system. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Process | The steps involved in exchanging cyber threat intelligence. |
| Contextual Bandit Performance | The effectiveness of a contextual bandit algorithm. |
| Cyber-Physical Security Policy | A set of rules and procedures for securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Standard | A set of criteria for exchanging cyber threat intelligence. |
| Contextual Bandit Optimization | The process of improving the performance of a contextual bandit algorithm. |
| Cyber-Physical Security Standard | A set of criteria for securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Framework | A structured approach to exchanging cyber threat intelligence. |
| Contextual Bandit Evaluation | The process of assessing the performance of a contextual bandit algorithm. |
| Cyber-Physical Security Framework | A structured approach to securing cyber-physical systems. |
| Computational Zoology | The use of computers to study animals. |
| Cyber Threat Intelligence Sharing Protocol | A standardized method for exchanging cyber threat intelligence. |
| Contextual Bandit Analysis | The examination of a contextual bandit algorithm's behavior. |
| Cyber-Physical Security Tool | Software or hardware used to secure cyber-physical systems. |
| Database | An organized collection of structured data stored electronically in a computer system. |
| Data Structure | A specialized format for organizing, processing, retrieving and storing data (e.g., arrays, linked lists). |
| Debugging | The process of identifying and removing errors from computer hardware or software. |
| Deep Learning | A subset of machine learning using artificial neural networks with multiple abstraction layers. |
| DNS (Domain Name System) | The hierarchical naming system that translates domain names to IP addresses. |
| Distributed System | A system whose components are located on networked computers that communicate to achieve a common goal. |
| Docker | A platform for developing, shipping, and running applications in containers. |
| Data Mining | The process of discovering patterns in large datasets using machine learning, statistics, and database systems. |
| Dijkstra's Algorithm | An algorithm for finding the shortest paths between nodes in a graph. |
| Dynamic Programming | A method for solving complex problems by breaking them down into simpler subproblems. |
| Data Warehouse | A central repository of integrated data from one or more disparate sources. |
| DevOps | A set of practices combining software development (Dev) and IT operations (Ops). |
| Digital Signature | A mathematical scheme for verifying the authenticity of digital messages or documents. |
| DDoS (Distributed Denial of Service) | A cyberattack where multiple systems flood a target's resources to disrupt service. |
| Dart | A client-optimized programming language developed by Google for building mobile, desktop and web apps. |
| Data Science | An interdisciplinary field using scientific methods to extract knowledge from structured/unstructured data. |
| Dependency Injection | A design pattern where an object receives other objects it depends on (inversion of control). |
| Django | A high-level Python web framework encouraging rapid development and clean design. |
| Docker Compose | A tool for defining and running multi-container Docker applications. |
| Data Lake | A storage repository holding vast amounts of raw data in native format. |
| Dual Stack | A networking architecture allowing hosts to simultaneously communicate via IPv4 and IPv6. |
| Deadlock | A situation where processes block each other by holding resources needed by another. |
| DynamoDB | Amazon's fully managed NoSQL database service. |
| Data Modeling | The process of creating a data model for an information system. |
| Design Pattern | A general reusable solution to commonly occurring problems in software design. |
| Dart VM | The virtual machine that executes Dart code and provides runtime support. |
| Data Pipeline | A set of data processing elements connected in series for automated data flow. |
| Differential Privacy | A system for publicly sharing data while withholding information about individuals. |
| Directive (Programming) | A language construct specifying how a compiler should process input (e.g., #include in C). |
| Domain-Driven Design (DDD) | An approach to software development focusing on complex needs by connecting implementation to an evolving model. |
| Data Governance | The overall management of availability, usability, integrity, and security of enterprise data. |
| Dependency Graph | A directed graph representing dependencies of several objects toward each other. |
| Deterministic Algorithm | An algorithm that, given a particular input, will always produce the same output. |
| Durable (ACID) | A database property where committed transactions persist even after system failures. |
| Data Integrity | The maintenance and assurance of data accuracy and consistency over its lifecycle. |
| Datalog | A declarative logic programming language for querying databases. |
| Declarative Programming | A paradigm expressing the logic of computation without describing control flow (e.g., SQL). |
| Docker Swarm | Docker's native clustering and orchestration tool. |
| Dataframe | A 2D labeled data structure with columns of potentially different types (Pandas, R). |
| Dynamic Typing | A language feature where type checking is performed at runtime (e.g., Python, JavaScript). |
| Denormalization | A database optimization technique adding redundant data to improve read performance. |
| Dual Core | A CPU with two complete execution cores per physical processor. |
| Data Dictionary | A centralized repository of information about data such as meaning, relationships, origin, usage. |
| Dimensional Modeling | A data structure technique optimized for data warehousing tools. |
| Duck Typing | A style of dynamic typing where an object's suitability is determined by presence of methods/properties. |
| Dockerfile | A text document containing commands to assemble a Docker image. |
| Data Cleansing | The process of detecting and correcting corrupt or inaccurate records from datasets. |
| Depth-First Search (DFS) | A graph traversal algorithm exploring as far as possible along each branch before backtracking. |
| Deployment | The activities making a software system available for use. |
| Data Serialization | The process of converting data structures into a storable/transmittable format (e.g., JSON, Protocol Buffers). |
| DMA (Direct Memory Access) | A feature allowing hardware subsystems to access memory independently of the CPU. |
| Data Federation | An approach integrating multiple databases into a virtual database. |
| Dart Native | Dart code compiled to native machine code for mobile/desktop apps. |
| Discrete Mathematics | Mathematical structures fundamentally discrete rather than continuous (essential for CS). |
| Data Replication | The process of storing data in multiple locations to improve availability and fault tolerance. |
| Dependency Management | Tools and processes for handling external libraries/packages a project relies on. |
| Dart Web | Dart code compiled to JavaScript for web applications. |
| Data Masking | A technique creating structurally similar but inauthentic data for privacy protection. |
| Deterministic Finite Automaton (DFA) | A finite state machine accepting/rejecting strings of symbols by running through a state sequence. |
| Data Wrangling | The process of cleaning, structuring, and enriching raw data into a desired format. |
| Docker Hub | A cloud-based registry service for sharing Docker container images. |
| Data Parallelism | A form of parallel computing where the same operation is performed on multiple data simultaneously. |
| Dual Boot | A configuration where a computer has two operating systems and can boot into either. |
| Data Visualization | The graphical representation of information and data (e.g., charts, graphs). |
| Dart Isolate | A lightweight thread in Dart's concurrency model with its own memory heap. |
| Data Normalization | The process of structuring a database to reduce redundancy and improve integrity. |
| Dynamic Link Library (DLL) | Microsoft's implementation of shared libraries in Windows. |
| Data Sovereignty | The concept that digital data is subject to laws of the country where it's located. |
| Dart FFI (Foreign Function Interface) | A mechanism for Dart code to call native C code. |
| Data Mesh | A decentralized architecture for data management and organizational scaling. |
| Domain Name | A human-readable web address (e.g., google.com) mapped to an IP address via DNS. |
| Dart Analyzer | A static analysis tool for Dart code that identifies errors and warnings. |
| Data Annotation | The process of labeling data to make it usable for machine learning. |
| Dynamic Host Configuration Protocol (DHCP) | A network protocol automatically assigning IP addresses to devices. |
| Data Stream | A continuous flow of data records processed incrementally. |
| Dart Pub | Dart's package manager for sharing and using libraries. |
| Data Quality | The measure of data's fitness to serve its purpose in a given context. |
| Digital Twin | A virtual representation serving as the real-time digital counterpart of a physical object. |
| Dart Test | Dart's built-in testing framework. |
| Data Fabric | An architecture and set of services providing consistent capabilities across hybrid multi-cloud environments. |
| Demultiplexer (Demux) | A circuit taking a single input and selecting one of many outputs. |
| Dart Formatter | A tool that automatically formats Dart code according to style guidelines. |
| Data Deduplication | A technique eliminating duplicate copies of repeating data to improve storage efficiency. |
| Docker Volume | A mechanism for persisting data generated by Docker containers. |
| Dart Doc | Dart's documentation generator that creates API reference docs from code comments. |
| Data Virtualization | An approach allowing applications to retrieve and manipulate data without technical details. |
| Dart Build System | A system for transforming and generating Dart code during development. |
| Data Lineage | The lifecycle of data including origins, movements, characteristics, and transformations. |
| Dart Native Extensions | A mechanism for extending Dart's capabilities with platform-specific code. |
| DataOps | A collaborative data management practice improving communication between data teams. |
| Dart Observatory | A profiling and debugging tool for Dart applications. |
| Data Profiling | The process of examining data for completeness, accuracy, and consistency. |
| Dart Code Metrics | Tools for analyzing Dart code quality and maintainability. |
| Data Retention | Policies determining how long data should be stored before deletion. |
| Dart DevTools | A suite of performance tools for Dart and Flutter development. |
| Data Synchronization | The process of establishing consistency among data across different systems. |
| Dart Fix | A tool for automatically applying fixes to Dart code based on analyzer suggestions. |
| Data Transformation | The process of converting data from one format/structure to another. |
| Dart Linter | A static analysis tool enforcing coding standards in Dart projects. |
| Data Validation | The process of ensuring data is clean, correct, and useful. |
| Dart Native Assets | A mechanism for bundling platform-specific resources with Dart applications. |
| Data Versioning | The practice of tracking and managing changes to datasets over time. |
| Dart Platform Interface | A design pattern for writing platform-agnostic Dart code with platform-specific implementations. |
| Data Vault | A data modeling approach for historical data tracking in data warehouses. |
| Dart Plugin | An extension adding functionality to the Dart development environment. |
| Data Ingestion | The process of importing data from various sources into a system for storage/analysis. |
| Dart SDK | The Software Development Kit containing tools for Dart development. |
| Data Partitioning | The practice of dividing data into subsets for improved performance and manageability. |
| Dart Standalone | Dart programs that run independently outside of browsers. |
| Data Persistence | The characteristic of data that outlives the execution of the program that created it. |
| Dart WebAssembly (Wasm) | Compiling Dart to WebAssembly for web deployment. |
| Data Migration | The process of transferring data between storage types, formats, or systems. |
| Dart Web Components | A way to create reusable custom elements in web applications using Dart. |
| Data Compression | The process of encoding information using fewer bits to reduce storage/transmission requirements. |
| Dart Web Server | A server-side application written in Dart for handling HTTP requests. |
| Data Consistency | The property ensuring all data copies in a distributed system are identical at all times. |
| Dart Web Starter | Templates and tools for bootstrapping Dart web applications. |
| Data Classification | The process of organizing data into categories for efficient use and protection. |
| Dart Web Toolkit | Libraries and tools for building web applications with Dart. |
| Data Archiving | The process of moving data that is no longer actively used to separate storage for long-term retention. |
| Dart Web UI | A declarative framework for building web user interfaces in Dart. |
| Data Aggregation | The compilation of information from databases with intent to prepare combined datasets for analysis. |
| Dart Web Workers | A mechanism for running Dart scripts in background threads for web applications. |
| Data Analytics | The science of analyzing raw data to make conclusions about information. |
| Dart WebSockets | A protocol providing full-duplex communication channels over a single TCP connection in Dart web apps. |
| Data Binding | A general technique that binds data sources from the provider and consumer together. |
| Dart Web Framework | A software framework designed to support development of web applications using Dart. |
| Data Catalog | An organized inventory of data assets in an organization. |
| Dart Web Components | A way to create reusable custom elements in web applications using Dart. |
| Data Flow | The movement of data through a system comprising software, hardware, or a combination. |
| Dart Web Development | The process of building web applications using the Dart programming language. |
| Data Hierarchy | The systematic organization of data, often in a tree-like structure. |
| Dart Web Application | An application program that is stored on a remote server and delivered over the Internet through a browser interface, written in Dart. |
| Encryption | The process of converting readable data into a secret code to prevent unauthorized access. |
| Ethernet | A system for connecting computers within a local area network (LAN) using cables. |
| Email Protocols | Rules that define how emails are sent and received, such as SMTP, POP3, and IMAP. |
| Edge Computing | Processing data near its source rather than relying on a centralized cloud, to increase speed and efficiency. |
| Embedded System | A computer built into a larger device to perform specific control functions, like in washing machines or cars. |
| Exception Handling | A way in programming to manage errors or unexpected events during program execution. |
| Executor Service | A framework in programming that helps manage and control multiple threads efficiently. |
| Firewall | A network security tool that filters incoming and outgoing traffic based on security rules. |
| Firmware | Software programmed into hardware devices to control their functions, like in routers or printers. |
| Frontend Development | The part of web development that deals with how a website looks and interacts with users using HTML, CSS, and JavaScript. |
| File System | The method an operating system uses to organize and store files on a disk or drive. |
| Fetch API | A modern JavaScript interface for making HTTP requests to get or send data from servers. |
| Floating Point | A number format that represents real numbers with decimal points in programming. |
| Function Overloading | A feature in some languages where multiple functions have the same name but different parameters. |
| Gateway | A network node that connects two different networks and controls traffic between them. |
| GPU (Graphics Processing Unit) | A specialized processor that handles graphics rendering and complex mathematical calculations. |
| Git | A version control system that helps developers track code changes and collaborate efficiently. |
| GUI (Graphical User Interface) | A visual interface that lets users interact with computers using icons, buttons, and windows instead of text commands. |
| Garbage Collection | An automatic memory management process that removes unused objects to free up space. |
| Gradient Descent | An optimization algorithm used in machine learning to minimize errors by adjusting model parameters. |
| Grid Computing | A distributed system that connects many computers to work together as one large system. |
| HTTP (Hypertext Transfer Protocol) | The protocol used for transferring web pages and data between web browsers and servers. |
| HTML (Hypertext Markup Language) | The standard language used to create and structure web pages. |
| Hash Table | A data structure that stores key–value pairs for quick data retrieval. |
| Heuristic | A practical problem-solving method that finds good solutions faster when perfect solutions are too complex. |
| Hosting Server | A computer that stores website files and makes them accessible over the internet. |
| Hyperlink | A clickable link that connects one webpage or resource to another. |
| Hybrid Cloud | A combination of private and public cloud services that allows data and applications to move between them. |
| IP Address | A unique numerical label assigned to each device connected to a network. |
| IDE (Integrated Development Environment) | A software tool that provides programmers with code editors, debuggers, and build automation. |
| IoT (Internet of Things) | A network of physical devices connected to the internet, enabling them to collect and exchange data. |
| Indexing | A database technique used to speed up data retrieval by creating data maps. |
| Inheritance | An object-oriented programming feature where a new class can use properties and methods of another class. |
| Interpreter | A program that executes code line by line, without the need for compilation. |
| IPv6 | The latest version of the Internet Protocol that supports a much larger number of IP addresses. |
| Java Virtual Machine (JVM) | A program that allows Java code to run on any device by converting it into machine code. |
| JavaScript | A versatile programming language used to make web pages interactive and dynamic. |
| JSON (JavaScript Object Notation) | A lightweight data format used for exchanging information between a client and server. |
| Jupyter Notebook | An open-source web app used for writing and sharing code, data analysis, and visualizations, often in Python. |
| Job Scheduler | A tool that automatically runs predefined tasks or scripts at specific times. |
| Join Operation | A database operation that combines data from two or more tables based on a related column. |
| Just-In-Time Compilation (JIT) | A technique that converts code into machine language right before it runs, improving performance. |
| Kernel | The main component of an operating system that manages resources like memory, processes, and hardware devices. |
| Keyword | A reserved word in programming languages that has a specific meaning and cannot be used as an identifier. |
| Knowledge Base | A structured collection of information that helps in decision-making, AI, or customer support. |
| Kubernetes | An open-source platform that automates deployment, scaling, and management of containerized applications. |
| Keystroke Logging | A method of recording keyboard input, often used for monitoring or malicious activity. |
| K-Nearest Neighbors (KNN) | A simple machine learning algorithm that classifies data points based on their closest neighbors. |
| Key Pair | A set of cryptographic keys used in encryption and authentication — one public and one private. |
| Load Balancer | A system that distributes incoming network traffic across multiple servers to improve performance and reliability. |
| Local Area Network (LAN) | A network that connects computers and devices within a small area, such as an office or school. |
| Library | A collection of pre-written code that developers can use to speed up software development. |
| Logic Gate | An electronic component that performs basic logical functions like AND, OR, and NOT in digital circuits. |
| Latency | The delay between a user's action and the system's response, often measured in milliseconds. |
| Load Testing | A process to check how a system performs under heavy usage or traffic. |
| Linear Regression | A basic statistical method used in data analysis to predict one value based on another. |
| Machine Learning | A branch of artificial intelligence where computers learn from data to make predictions or decisions without being explicitly programmed. |
| Mainframe | A large and powerful computer system used by organizations to handle massive amounts of data and transactions. |
| Malware | Software designed to harm, steal, or damage data and systems — examples include viruses and spyware. |
| Middleware | Software that connects different applications or services so they can communicate smoothly. |
| Microprocessor | A small electronic chip that acts as the brain of a computer, processing data and instructions. |
| Modem | A device that converts digital data into signals for transmission over phone or cable lines, and vice versa. |
| Multithreading | A technique that allows a program to perform multiple tasks at the same time for better performance. |
| Neural Network | A computer system modeled after the human brain that helps in recognizing patterns and making intelligent decisions. |
| Node | A connection point in a network or data structure, such as a computer in a network or an element in a linked list. |
| Network Topology | The arrangement of devices and connections in a computer network, such as star, ring, or mesh. |
| Normalization | A process in databases to organize data efficiently and reduce redundancy. |
| NAT (Network Address Translation) | A technique that allows multiple devices on a local network to share a single public IP address. |
| Namespace | A container in programming that holds unique names to avoid naming conflicts between variables or functions. |
| Null Value | A special marker in databases or programming that represents missing or undefined data. |
| Object-Oriented Programming (OOP) | A programming model that organizes code into reusable objects containing data and behavior. |
| Operating System (OS) | Software that manages computer hardware and provides services for programs, like Windows, macOS, or Linux. |
| Open Source | Software whose source code is freely available for anyone to use, modify, and distribute. |
| Overclocking | Running a computer processor faster than its official speed to improve performance. |
| Optimization | The process of improving the performance, speed, or efficiency of software or hardware. |
| Object Detection | A computer vision technique used to identify and locate objects in images or videos. |
| Output Device | Hardware that displays or outputs data from a computer, such as a monitor or printer. |
| Python | A popular high-level programming language known for its readability and use in data science, AI, and web development. |
| Packet | A small unit of data transmitted over a network, containing both control and content information. |
| Parallel Processing | A method where multiple processors execute different parts of a program simultaneously to speed up performance. |
| Protocol | A set of rules that define how data is transmitted and received between devices on a network. |
| Phishing | A cyber-attack technique where attackers trick users into giving away personal or financial information. |
| Proxy Server | An intermediary server that acts between a user and the internet to provide security or anonymity. |
| Primary Key | A unique identifier in a database table used to distinguish each record from others. |
| Query | A request made to a database to retrieve or modify information. |
| Quantum Computing | A new type of computing that uses quantum bits (qubits) to perform calculations much faster than classical computers. |
| Queue | A data structure that stores elements in a first-in, first-out (FIFO) order. |
| Quick Sort | An efficient sorting algorithm that uses the divide-and-conquer technique to organize data. |
| QoS (Quality of Service) | A feature in networking that manages data traffic to reduce delays and improve performance for important applications. |
| Query Optimization | A process in databases to choose the fastest way to execute a data retrieval command. |
| RAM (Random Access Memory) | A temporary memory used by computers to store data and instructions while programs are running. |
| Router | A network device that directs data packets between computers and networks. |
| Runtime Environment | The environment where a program is executed, including memory, libraries, and dependencies. |
| Recursion | A programming technique where a function calls itself to solve a smaller instance of the same problem. |
| REST API | A web service that allows systems to communicate using standard HTTP methods like GET, POST, PUT, and DELETE. |
| RAID (Redundant Array of Independent Disks) | A storage method that combines multiple hard drives for better performance or fault tolerance. |
| Regression Testing | Testing done to ensure that new code changes don’t break existing functionality. |
| SQL (Structured Query Language) | A programming language used to manage and query data in relational databases. |
| Stack | A data structure that follows the last-in, first-out (LIFO) principle for storing and accessing elements. |
| Server | A computer or software that provides data or services to other computers over a network. |
| Software Development Life Cycle (SDLC) | A process that describes the steps involved in developing software — from planning to deployment. |
| Source Code | The human-readable form of a program written in a programming language. |
| Shell | A command-line interface that allows users to interact with an operating system. |
| Scrum | An agile project management framework used for developing software in small, iterative steps. |
| TCP/IP | A set of communication protocols that define how data is sent over the internet. |
| Tokenization | The process of breaking text or data into smaller parts, often used in natural language processing or security. |
| Thread | The smallest unit of execution within a process, allowing multiple tasks to run simultaneously. |
| Two-Factor Authentication (2FA) | An extra layer of security requiring two forms of verification, such as a password and an OTP. |
| Throughput | The rate at which data is processed or transferred over a system or network. |
| TensorFlow | An open-source framework developed by Google for building and training machine learning models. |
| Testing Framework | A set of tools and libraries used to write, organize, and run automated tests for software. |
| URL (Uniform Resource Locator) | The address used to access a specific resource on the internet, like a webpage. |
| UI (User Interface) | The part of a system that users interact with, including buttons, menus, and visuals. |
| UML (Unified Modeling Language) | A visual language used to design and document software systems. |
| UDP (User Datagram Protocol) | A communication protocol that sends data quickly but without checking if it was received correctly. |
| User Experience (UX) | The overall feeling a user has while interacting with a system or product. |
| Unicode | A universal standard for encoding text in almost every writing system used around the world. |
| Utility Software | Programs designed to maintain and optimize computer performance, such as antivirus or file management tools. |
| Virtual Machine (VM) | A software emulation of a physical computer that runs an operating system and applications independently. |
| Version Control | A system that tracks changes to code or documents, allowing collaboration and history management, like Git. |
| Virtual Reality (VR) | A technology that creates a simulated environment that users can interact with using special devices. |
| VPN (Virtual Private Network) | A service that encrypts your internet connection to provide privacy and access to restricted content. |
| Visualization | The process of creating visual representations of data to make it easier to understand and analyze. |
| Vector Graphics | Images created using lines and shapes instead of pixels, which can be resized without losing quality. |
| Web Development | The process of building websites and web applications using languages like HTML, CSS, and JavaScript. |
| Wireless Network | A network that connects devices without cables, using radio waves or Wi-Fi technology. |
| Webhook | A method for one system to automatically send real-time data to another system via a URL. |
| White Hat Hacker | A security expert who tests systems for vulnerabilities legally to improve security. |
| Workflow | A sequence of tasks or processes that are followed to complete a job efficiently. |
| Word Embedding | A technique in natural language processing to represent words as numerical vectors for machine learning. |
| XML (eXtensible Markup Language) | A flexible text format used to store and transport data between different systems. |
| XPath | A language used to navigate and find specific elements in an XML document. |
| XSS (Cross-Site Scripting) | A security vulnerability that allows attackers to inject malicious scripts into web pages viewed by others. |
| XOR Gate | A digital logic gate that outputs true only if the inputs are different from each other. |
| YAML (YAML Ain’t Markup Language) | A human-readable data format used for configuration files and data serialization. |
| Yield | A keyword in some programming languages that allows a function to pause and return a value, resuming later. |
| Yellow Book Standard | A set of guidelines for programming languages and systems to ensure compatibility and quality. |
| YouTube API | An interface provided by YouTube to allow developers to access videos, channels, and playlists programmatically. |
| Zero-Day Vulnerability | A security flaw that is unknown to software makers and can be exploited by attackers before being fixed. |
| Zooming User Interface (ZUI) | A graphical interface that allows users to zoom in and out of content for better navigation and focus. |
| Z-Score | A statistical measure that describes how far a value is from the average in terms of standard deviations. |
| Zip Compression | A method to reduce the size of files by compressing data, making storage and transfer faster. |
| Zombie Process | A process in computing that has finished execution but still occupies system resources until fully removed. |