IT Glossary

Active Directory

An advanced directory application created by Microsoft for use on Windows servers. It is a critical part of Windows server and is used to set permissions, enforce critical updates, and run software on particular machines.


Asymmetric digital subscriber line, or ADSL, is the technology that enables someone to use their telephone line for both data and voice, simultaneously.


Adware is any piece of software that automatically downloads or displays advertisements. The purpose of this is to bring in extra revenue for the developer. Although adware itself is not particularly harmful, it can be hidden in downloaded files and consistently pop up on a user’s computer. This can cause an annoyance, however a spyware cleaner can be used to remove any unwanted adware.


Anti-virus software is used to prevent or remove unwanted malware from infecting a computer. Using this software provides a computer user with a safer working environment and a more efficiently operating computer. There are lots of companies offering anti-virus software including Symantec, McAfee, and Avast.


Backup refers to a user backing up computer data to a separate hard drive or to a cloud-based server. If a user does not backup their data, there is a high risk data could become lost or corrupted.


Bandwidth is the amount of data sent through a network or modem. Measured in bits per second, the higher the bandwidth then the more that can be transferred.


Short for binary digit, a bit is the smallest unit of information on a computer machine. A single bit can only hold one of two values: 0 or 1. Computers are often classified by the number of bits they can process at one time, typically 32 or 64 bit.


Broadband refers to a telecommunications signal that is of greater bandwidth to other solutions. Broadband is a fast way of users connecting to the internet and allows faster download speeds than older methods such as 56k dial-up.


A browser is a software application that allows users to access information on the internet. Popular browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Apple’s Safari.

Business Intelligence

A broad range of applications and technologies that allow businesses to analyse data in detail and can lead people to make more informed decisions, resulting in improved business processes.


A byte is a group of binary digits. Usually 8 consecutive bits, this collection of information can be used to represent a character on a computer.


A cache is a block of RAM that temporarily stores data that may need to be used in the near future. Internet browsers use cache to store certain data that users may need to access again without the need to have to wait for the screen to load.

Cloud Computing

This is the practice of storing content on remote servers that are connected to the internet instead of on your hard drive or local server. With cloud computing, less physical storage space is needed as files are stored remotely. It also brings the benefit of being able to access your data from anywhere that there is an internet connection. Cloud computing is highly automated and reduces the need for a large IT department to manage data.


Cookies are pieces of text stored by web browsers that can track user behaviour on websites or be used to remember preferences for future visits.


The central processing unit or CPU acts as the brain of a computer. It is a microprocessor chip and does the vast majority of the data processing.


CRM stands for customer relationship management. It is a piece of software used primarily by businesses and is a way to centrally manage all interactions with customers. There are various CRM packages including Microsoft Dynamics and Act by Sage.

Disk Partitioning

The act of virtually separating a hard disk so that it behaves as though it were multiple disks.


A domain name server or DNS is the hierarchical structure of how web addresses are constructed.


Electronic data interchange is a standard for communicating data between electronic devices.


This is the method of concealing information so that it is unreadable to unauthorised people.


Enterprise resource planning, or ERP for short, is a type of business application used to centrally manage all business processes and allow businesses to gain insights into how well they are performing in particular areas. SAP, Sage, and Oracle are well known providers of ERP software.


A part of a computer system or network that is designed to block outward communication by unauthorised personnel.


The graphical processing unit, or GPU for short, is a microchip that is designed to process all graphical commands.

Hard drive

Normally located inside a PC, the hard drive or HDD for short is a computer’s primary storage medium.


Hardware refers to all the physical parts of a computer or computer network.


Hypertext Markup Language is a coding language in which web pages are written.

IP address

An internet protocol address is an unique number system which is allocated to every computer connected to the internet.


A LAN or local area network is a computer network usually connected by cables that covers a small area such as a home or office.


Linux is an open source operating system that is based on the UNIX operating system. Linux is free for users to download and use.

Mac OS

The operating systems used on Apple Macintosh computers, referred to as Mac OSX since version 10. Mac OS comes pre-installed on Apple computers.

Mobile working

Mobile working refers to the practice of people working away from their offices and needing to stay connected to the company network. This requires hardware such as laptops or smartphones, as well as a secure VPN (virtual private network).


A series of electronic devices, such as computers, that are connected together and can freely exchange information.

Network Infrastructure

This refers to all the cabling, routers, switches and any other equipment that makes up a computer network. A network can be based on a variety of different technologies and can range from low speed dial up, to high speed fibre optic cabling.


Random access memory (RAM) is temporary computer memory held on microchips. Instructions and data are held in RAM while the computer is in use and disappear when turned off. The more RAM a computer has, the more applications a user can run simultaneously.


Routers are little electrical boxes that pass packets of data among multiple interconnected networks.


Small computer system interface, otherwise known as “Scuzzy”, is a standard for connecting computers and peripherals together.

Serial ATA (SATA)

Serial advanced technology attachment is a type of connectivity used primarily for hard drives. It is a replacement for parallel ATA.


Programs or applications that are run on computers or other electrical devices. Software can be stored on physical discs or stored on hard drives.


Transmission control protocol/internet protocol. This is the basic communication language that the internet uses.

Trojan horse

A specific type of computer malware that manifests itself as a desirable application or piece of software. It looks harmless but when opened infects a computer and can allow hackers to steal information or cause unwanted harm to the device.


Uniform resource locator. A URL is a string of characters that when typed into an internet browser allows access to a specific page on the internet. A URL essentially acts as a gate to the world wide web. If a URL is not entered, an internet browser will not know the correct web page to access.


Universal serial bus, or USB for short, is a standard connection type used for a wide range of devices. It usually refers to the cables, connectors and ports that connect the external devices to computers. Printers, flash drives, mobile phones, TV sets, and a whole host of other equipment are often connected through USB.


This is the method of partitioning one physical server into multiple virtual machines. Each virtual server can run separate operating systems and performs in the same way a physical machine performs.


A virtual private network (VPN) is a private company network that uses a public network, such as the internet, to connect remote offices or users together on a LAN. The process of connecting to a VPN is called tunnelling. All information is encryped at the IP level to ensure a highly secure log on.


A wide area network (WAN) is a computer network that connects a system of LANs over a large distance via fibre optic cables, telephone lines, or radio waves.


Windows is a series of operating systems produced by Microsoft. The most current iteration is Windows 7.


Warehouse management system. Computer software used to manage the storage and movement of inventory throughout a warehouse. Warehouse management software can be integrated with SAP Business One and often uses radio frequency technology to communicate with RFID scanners to enable real time insights to operations.