Computer Dictionary

Search and explore key computer science terms including programming, hardware, networking, databases, AI, and more.

Showing 494 terms
KeywordDescription
Abstract Data Type (ADT)A mathematical model for data types that defines behavior without implementation details (e.g., Stack, Queue).
Access ControlSecurity policies restricting unauthorized access to systems/resources (e.g., RBAC, ACL).
AccumulatorCPU register storing intermediate arithmetic/logic results.
AdderDigital circuit performing binary addition (Half-Adder, Full-Adder).
Address BusHardware pathway carrying memory addresses between CPU and RAM.
Adversarial AIAttacks manipulating ML models (e.g., adversarial examples).
Agile DevelopmentIterative software methodology (Scrum, Kanban).
AJAXAsynchronous JavaScript/XML for dynamic web content.
AlgorithmStep-by-step problem-solving procedure (e.g., Dijkstra’s, Quicksort).
Alpha TestingInitial software testing by internal teams.
ALU (Arithmetic Logic Unit)CPU component performing calculations/bitwise operations.
Amazon Web Services (AWS)Cloud computing platform (EC2, S3, Lambda).
Analog ComputerProcesses continuous data (e.g., voltage, temperature).
Android SDKToolkit for building Android apps.
AnimationRapid image sequencing to simulate motion.
ANSIAmerican National Standards Institute (e.g., ANSI C).
APIApplication Programming Interface for software interaction.
AppletSmall Java application running in browsers (deprecated).
ArchivingLong-term data storage/compression (e.g., ZIP, TAR).
ARPAddress Resolution Protocol (maps IP to MAC).
ArrayFixed-size collection of same-type elements.
Artificial Intelligence (AI)Machines mimicking human intelligence (ML, NLP, Robotics).
AssemblerConverts assembly language to machine code.
Assembly LanguageLow-level programming using mnemonics (e.g., MOV, ADD).
Asymmetric EncryptionPublic-key cryptography (e.g., RSA, ECC).
AtomicityDatabase property ensuring transactions are all-or-nothing (ACID).
AttributeData field in OOP or databases (e.g., class properties).
AuthenticationVerifying user identity (e.g., passwords, OTP).
AuthorizationGranting resource access post-authentication.
AutocompleteUI feature predicting user input (e.g., search suggestions).
Automata TheoryStudy of abstract machines (DFA, NFA, Turing Machines).
AVL TreeSelf-balancing binary search tree.
A* AlgorithmPathfinding algorithm using heuristics.
AbstractionHiding complexity while exposing essentials (OOP principle).
Active DirectoryMicrosoft’s directory service for network management.
Actor ModelConcurrency framework (e.g., Akka, Erlang).
Adaptive SoftwarePrograms adjusting behavior based on environment.
Adjacency MatrixGraph representation using a 2D array.
Affine TransformationLinear mapping in graphics (rotation, scaling).
Agent-Based ModelingSimulating autonomous agents (e.g., traffic systems).
Ambient IntelligenceSmart environments reacting to human presence.
Apache HadoopFramework for distributed big data processing.
Augmented Reality (AR)Overlaying digital content on real-world views.
BackendThe server-side part of an application that handles logic, databases, and APIs.
BackpropagationAn algorithm used in training neural networks to calculate gradients for weight updates.
BackupThe process of copying data to restore it in case of loss or corruption.
BandwidthThe maximum data transfer rate of a network or internet connection, measured in bits per second (bps).
Base CaseThe terminating condition in a recursive function that stops further recursion.
Batch ProcessingExecuting a series of jobs (data/commands) without manual intervention, often scheduled.
Behavioral ModelA design pattern focusing on communication between objects (e.g., Observer, Strategy).
Big O NotationA mathematical notation describing the upper bound of an algorithm's time/space complexity.
Binary SearchAn efficient O(log n) search algorithm for sorted arrays by repeatedly dividing the interval.
Binary TreeA tree data structure where each node has at most two children (left and right).
BitThe smallest unit of data in computing, representing a binary value (0 or 1).
BlockchainA decentralized, distributed ledger technology for secure transactions (e.g., Bitcoin, Ethereum).
BooleanA data type with two values: true or false.
BootstrapA front-end framework for responsive web design using HTML/CSS/JS.
BotnetA network of compromised devices controlled by malware for DDoS attacks or spam.
BranchA divergence in code execution (e.g., in version control or CPU pipelines).
Breadth-First Search (BFS)A graph traversal algorithm exploring all neighbor nodes at the present depth before moving deeper.
BufferA temporary memory area storing data during transfer between processes/devices.
BugAn error or flaw in software causing unexpected behavior.
BusA communication system transferring data between computer components (e.g., USB, PCI).
ByteA unit of data equal to 8 bits, representing a single character (e.g., 'A' = 65 in ASCII).
BytecodeIntermediate code executed by virtual machines (e.g., Java JVM, Python PVM).
CacheA high-speed data storage layer that stores a subset of data for faster access.
Call StackA stack data structure that stores information about active subroutines in a program.
CompilerA program that translates source code written in a high-level language into machine code.
CryptographyThe practice of secure communication techniques to protect information from adversaries.
CSS (Cascading Style Sheets)A stylesheet language used to describe the presentation of a document written in HTML.
CPU (Central Processing Unit)The electronic circuitry that executes instructions comprising a computer program.
Cloud ComputingThe delivery of computing services over the internet ('the cloud') including servers, storage, databases, etc.
CybersecurityThe practice of protecting systems, networks, and programs from digital attacks.
ConcurrencyThe ability of different parts or units of a program to be executed out-of-order or in partial order.
CookieA small piece of data sent from a website and stored on the user's computer by the web browser.
CAP TheoremA concept that a distributed system can only provide 2 of 3 guarantees: Consistency, Availability, and Partition tolerance.
CI/CD (Continuous Integration/Continuous Deployment)A method to frequently deliver apps by introducing automation into the stages of app development.
C++A general-purpose programming language created as an extension of the C programming language.
C#A general-purpose, multi-paradigm programming language encompassing strong typing and object-oriented programming.
Command Line Interface (CLI)A text-based interface used to interact with software and operating systems.
Client-Server ModelA distributed application structure that partitions tasks between providers (servers) and requesters (clients).
Computer VisionA field of artificial intelligence that trains computers to interpret and understand the visual world.
ChatbotA software application used to conduct an online chat conversation via text or text-to-speech.
ClusteringA machine learning technique that groups similar data points together.
ChecksumA small-sized datum derived from a block of digital data for detecting errors.
Cross-PlatformSoftware that can run on multiple computing platforms with minimal modifications.
Cron JobA time-based job scheduler in Unix-like operating systems.
Content Delivery Network (CDN)A geographically distributed network of proxy servers and their data centers.
Cyclomatic ComplexityA software metric used to indicate the complexity of a program.
CachingThe process of storing copies of files in a cache for quicker access.
ContainerizationA lightweight alternative to full machine virtualization that involves encapsulating an application in a container.
Code ReviewA systematic examination of computer source code intended to find and fix mistakes overlooked in development.
Cache CoherenceThe uniformity of shared resource data that ends up stored in multiple local caches.
ClosureA function that has access to its own scope, the outer function's variables, and global variables.
CORS (Cross-Origin Resource Sharing)A mechanism that allows restricted resources on a web page to be requested from another domain.
CipherAn algorithm for performing encryption or decryption.
CRUD (Create, Read, Update, Delete)The four basic functions of persistent storage in database applications.
Context SwitchThe process of storing the state of a process or thread so that it can be restored and execution resumed later.
Continuous IntegrationThe practice of merging all developers' working copies to a shared mainline several times a day.
CyberattackAn attempt to damage, disrupt, or gain unauthorized access to a computer system or network.
CachingThe process of storing copies of files in a cache for quicker access.
ClusteringA machine learning technique that groups similar data points together.
CyberneticsThe science of communications and automatic control systems in both machines and living things.
Code RefactoringThe process of restructuring existing computer code without changing its external behavior.
Convolutional Neural Network (CNN)A class of deep neural networks, most commonly applied to analyzing visual imagery.
CryptocurrencyA digital currency in which transactions are verified and records maintained by a decentralized system.
Cyber-Physical SystemsSystems that integrate computation, networking, and physical processes.
Content Management System (CMS)A software application used to create and manage digital content.
Computational ComplexityA branch of computer science that focuses on classifying computational problems according to their difficulty.
Computer ArchitectureThe set of rules and methods that describe the functionality, organization, and implementation of computer systems.
CyberspaceThe notional environment in which communication over computer networks occurs.
Coding StandardsA set of guidelines for a specific programming language that recommend programming style, practices, and methods.
Cellular AutomatonA discrete model studied in computability theory, mathematics, physics, complexity science, theoretical biology.
Cyber WarfareThe use of digital attacks to attack a nation, causing comparable harm to actual warfare.
Code ObfuscationThe deliberate act of creating source or machine code that is difficult for humans to understand.
Cascading FailureA failure in a system of interconnected parts where the failure of one part can trigger the failure of successive parts.
Computational ThinkingA problem-solving process that includes formulating problems, logically organizing data, and representing data through abstractions.
Cloud StorageA model of computer data storage in which the digital data is stored in logical pools across multiple servers.
Cyber HygieneBasic steps and practices that users can take to improve their cybersecurity.
Computer NetworkA set of computers connected together for the purpose of sharing resources.
Circuit SwitchingA method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel.
Coding TheoryThe study of the properties of codes and their fitness for a specific application.
Cyber Threat IntelligenceInformation about threats and threat actors that helps mitigate harmful events in cyberspace.
Cluster AnalysisThe task of grouping a set of objects in such a way that objects in the same group are more similar to each other.
Computational BiologyThe science of using biological data to develop algorithms and models to understand biological systems.
Cyber ResilienceThe ability of a system to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, or attacks.
Context-Free GrammarA formal grammar where production rules are of the form A → α, where A is a nonterminal and α is a string of terminals and/or nonterminals.
Cyber-Physical SecurityThe protection of cyber-physical systems from malicious attacks.
Concurrent ComputingA form of computing in which several computations are executed during overlapping time periods.
Code SmellAny characteristic in the source code of a program that possibly indicates a deeper problem.
Cyber InsuranceAn insurance product used to protect businesses from Internet-based risks.
Computer Vision SyndromeA condition resulting from focusing the eyes on a computer display for extended periods.
Cyber LawThe legal issues related to use of communications technology, particularly cyberspace.
Cloud SecurityThe set of policies, technologies, and controls deployed to protect data and infrastructure in cloud computing.
Computational GeometryA branch of computer science devoted to the study of algorithms which can be stated in terms of geometry.
Cyber EspionageThe use of computer networks to gain illicit access to confidential information.
Contextual BanditA machine learning algorithm that selects actions based on contextual information.
Cyber ForensicsThe practice of identifying, acquiring, processing, analyzing, and reporting on data stored electronically.
Computational LinguisticsThe scientific study of language from a computational perspective.
Cyber RangeA virtual environment used for cybersecurity training and simulations.
Cognitive ComputingSystems that learn at scale, reason with purpose, and interact with humans naturally.
Cyber Risk ManagementThe process of identifying, assessing, and prioritizing risks to information and information systems.
Computational NeuroscienceThe study of brain function in terms of the information processing properties of the structures that make up the nervous system.
Cyber Threat HuntingThe practice of proactively searching for cyber threats that are lurking undetected in a network.
Context-Aware ComputingA computing paradigm that uses context to provide relevant information and services to the user.
Cyber-Physical AttackA security breach in cyberspace that impacts operations in the physical world.
Computational PhysicsThe study and implementation of numerical analysis to solve problems in physics.
Cyber Threat ModelingA process by which potential threats can be identified, enumerated, and prioritized.
Contextual AdvertisingA form of targeted advertising for advertisements appearing on websites or other media.
Cyber-Physical InterfaceThe boundary between the cyber and physical worlds where interactions occur.
Computational Social ScienceThe academic sub-discipline concerned with computational approaches to the social sciences.
Cyber Threat Intelligence SharingThe exchange of information about cyber threats between organizations.
Contextual InquiryA user-centered design research method that involves observing and interviewing users in their natural environment.
Cyber-Physical SimulationThe simulation of systems that integrate computation, networking, and physical processes.
Computational SustainabilityThe application of computational techniques to sustainable development.
Cyber Threat Intelligence PlatformA technology solution that aggregates, correlates, and analyzes threat intelligence data.
Contextual DesignA user-centered design process that uses contextual inquiry as its primary research method.
Cyber-Physical TestbedA platform for experimenting with cyber-physical systems.
Computational TopologyThe study of topological features of data from a computational perspective.
Cyber Threat Intelligence FeedA stream of data containing information about cyber threats.
Contextual Bandit ProblemA machine learning problem where an algorithm must select actions based on contextual information.
Cyber-Physical Security ExerciseA training exercise focused on securing cyber-physical systems.
Computational TypologyThe computational study of language typology.
Cyber Threat Intelligence AnalystA professional who analyzes cyber threat intelligence data.
Contextual Bandit AlgorithmA machine learning algorithm that solves the contextual bandit problem.
Cyber-Physical Security AssessmentAn evaluation of the security of a cyber-physical system.
Computational VerificationThe use of computers to verify mathematical proofs.
Cyber Threat Intelligence FrameworkA structured approach to collecting, analyzing, and disseminating cyber threat intelligence.
Contextual Bandit ModelA machine learning model that implements a contextual bandit algorithm.
Cyber-Physical Security FrameworkA structured approach to securing cyber-physical systems.
Computational VirologyThe use of computers to study viruses.
Cyber Threat Intelligence LifecycleThe process by which cyber threat intelligence is collected, analyzed, and acted upon.
Contextual Bandit ProblemA machine learning problem where an algorithm must select actions based on contextual information.
Cyber-Physical Security PolicyA set of rules and procedures for securing cyber-physical systems.
Computational VisionThe use of computers to process and understand visual information.
Cyber Threat Intelligence PlatformA technology solution that aggregates, correlates, and analyzes threat intelligence data.
Contextual Bandit SolutionA method for solving the contextual bandit problem.
Cyber-Physical Security StandardA set of criteria for securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence ProcessThe steps involved in collecting, analyzing, and acting on cyber threat intelligence.
Contextual Bandit SystemA machine learning system that implements a contextual bandit algorithm.
Cyber-Physical Security TrainingEducation and exercises focused on securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence SharingThe exchange of information about cyber threats between organizations.
Contextual Bandit TechniqueA method for implementing a contextual bandit algorithm.
Cyber-Physical Security ToolSoftware or hardware used to secure cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing PlatformA technology solution that facilitates the exchange of cyber threat intelligence.
Contextual Bandit TheoryThe mathematical foundation of contextual bandit algorithms.
Cyber-Physical Security VulnerabilityA weakness in a cyber-physical system that could be exploited by a threat actor.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing ProtocolA standardized method for exchanging cyber threat intelligence.
Contextual Bandit VariantA modified version of the contextual bandit problem.
Cyber-Physical Security WorkshopA meeting or training session focused on securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing StandardA set of criteria for exchanging cyber threat intelligence.
Contextual Bandit ApplicationA practical use of contextual bandit algorithms.
Cyber-Physical Security ExerciseA training exercise focused on securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing FrameworkA structured approach to exchanging cyber threat intelligence.
Contextual Bandit ImplementationA specific way of coding a contextual bandit algorithm.
Cyber-Physical Security AssessmentAn evaluation of the security of a cyber-physical system.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing ProcessThe steps involved in exchanging cyber threat intelligence.
Contextual Bandit PerformanceThe effectiveness of a contextual bandit algorithm.
Cyber-Physical Security PolicyA set of rules and procedures for securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing StandardA set of criteria for exchanging cyber threat intelligence.
Contextual Bandit OptimizationThe process of improving the performance of a contextual bandit algorithm.
Cyber-Physical Security StandardA set of criteria for securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing FrameworkA structured approach to exchanging cyber threat intelligence.
Contextual Bandit EvaluationThe process of assessing the performance of a contextual bandit algorithm.
Cyber-Physical Security FrameworkA structured approach to securing cyber-physical systems.
Computational ZoologyThe use of computers to study animals.
Cyber Threat Intelligence Sharing ProtocolA standardized method for exchanging cyber threat intelligence.
Contextual Bandit AnalysisThe examination of a contextual bandit algorithm's behavior.
Cyber-Physical Security ToolSoftware or hardware used to secure cyber-physical systems.
DatabaseAn organized collection of structured data stored electronically in a computer system.
Data StructureA specialized format for organizing, processing, retrieving and storing data (e.g., arrays, linked lists).
DebuggingThe process of identifying and removing errors from computer hardware or software.
Deep LearningA subset of machine learning using artificial neural networks with multiple abstraction layers.
DNS (Domain Name System)The hierarchical naming system that translates domain names to IP addresses.
Distributed SystemA system whose components are located on networked computers that communicate to achieve a common goal.
DockerA platform for developing, shipping, and running applications in containers.
Data MiningThe process of discovering patterns in large datasets using machine learning, statistics, and database systems.
Dijkstra's AlgorithmAn algorithm for finding the shortest paths between nodes in a graph.
Dynamic ProgrammingA method for solving complex problems by breaking them down into simpler subproblems.
Data WarehouseA central repository of integrated data from one or more disparate sources.
DevOpsA set of practices combining software development (Dev) and IT operations (Ops).
Digital SignatureA mathematical scheme for verifying the authenticity of digital messages or documents.
DDoS (Distributed Denial of Service)A cyberattack where multiple systems flood a target's resources to disrupt service.
DartA client-optimized programming language developed by Google for building mobile, desktop and web apps.
Data ScienceAn interdisciplinary field using scientific methods to extract knowledge from structured/unstructured data.
Dependency InjectionA design pattern where an object receives other objects it depends on (inversion of control).
DjangoA high-level Python web framework encouraging rapid development and clean design.
Docker ComposeA tool for defining and running multi-container Docker applications.
Data LakeA storage repository holding vast amounts of raw data in native format.
Dual StackA networking architecture allowing hosts to simultaneously communicate via IPv4 and IPv6.
DeadlockA situation where processes block each other by holding resources needed by another.
DynamoDBAmazon's fully managed NoSQL database service.
Data ModelingThe process of creating a data model for an information system.
Design PatternA general reusable solution to commonly occurring problems in software design.
Dart VMThe virtual machine that executes Dart code and provides runtime support.
Data PipelineA set of data processing elements connected in series for automated data flow.
Differential PrivacyA system for publicly sharing data while withholding information about individuals.
Directive (Programming)A language construct specifying how a compiler should process input (e.g., #include in C).
Domain-Driven Design (DDD)An approach to software development focusing on complex needs by connecting implementation to an evolving model.
Data GovernanceThe overall management of availability, usability, integrity, and security of enterprise data.
Dependency GraphA directed graph representing dependencies of several objects toward each other.
Deterministic AlgorithmAn algorithm that, given a particular input, will always produce the same output.
Durable (ACID)A database property where committed transactions persist even after system failures.
Data IntegrityThe maintenance and assurance of data accuracy and consistency over its lifecycle.
DatalogA declarative logic programming language for querying databases.
Declarative ProgrammingA paradigm expressing the logic of computation without describing control flow (e.g., SQL).
Docker SwarmDocker's native clustering and orchestration tool.
DataframeA 2D labeled data structure with columns of potentially different types (Pandas, R).
Dynamic TypingA language feature where type checking is performed at runtime (e.g., Python, JavaScript).
DenormalizationA database optimization technique adding redundant data to improve read performance.
Dual CoreA CPU with two complete execution cores per physical processor.
Data DictionaryA centralized repository of information about data such as meaning, relationships, origin, usage.
Dimensional ModelingA data structure technique optimized for data warehousing tools.
Duck TypingA style of dynamic typing where an object's suitability is determined by presence of methods/properties.
DockerfileA text document containing commands to assemble a Docker image.
Data CleansingThe process of detecting and correcting corrupt or inaccurate records from datasets.
Depth-First Search (DFS)A graph traversal algorithm exploring as far as possible along each branch before backtracking.
DeploymentThe activities making a software system available for use.
Data SerializationThe process of converting data structures into a storable/transmittable format (e.g., JSON, Protocol Buffers).
DMA (Direct Memory Access)A feature allowing hardware subsystems to access memory independently of the CPU.
Data FederationAn approach integrating multiple databases into a virtual database.
Dart NativeDart code compiled to native machine code for mobile/desktop apps.
Discrete MathematicsMathematical structures fundamentally discrete rather than continuous (essential for CS).
Data ReplicationThe process of storing data in multiple locations to improve availability and fault tolerance.
Dependency ManagementTools and processes for handling external libraries/packages a project relies on.
Dart WebDart code compiled to JavaScript for web applications.
Data MaskingA technique creating structurally similar but inauthentic data for privacy protection.
Deterministic Finite Automaton (DFA)A finite state machine accepting/rejecting strings of symbols by running through a state sequence.
Data WranglingThe process of cleaning, structuring, and enriching raw data into a desired format.
Docker HubA cloud-based registry service for sharing Docker container images.
Data ParallelismA form of parallel computing where the same operation is performed on multiple data simultaneously.
Dual BootA configuration where a computer has two operating systems and can boot into either.
Data VisualizationThe graphical representation of information and data (e.g., charts, graphs).
Dart IsolateA lightweight thread in Dart's concurrency model with its own memory heap.
Data NormalizationThe process of structuring a database to reduce redundancy and improve integrity.
Dynamic Link Library (DLL)Microsoft's implementation of shared libraries in Windows.
Data SovereigntyThe concept that digital data is subject to laws of the country where it's located.
Dart FFI (Foreign Function Interface)A mechanism for Dart code to call native C code.
Data MeshA decentralized architecture for data management and organizational scaling.
Domain NameA human-readable web address (e.g., google.com) mapped to an IP address via DNS.
Dart AnalyzerA static analysis tool for Dart code that identifies errors and warnings.
Data AnnotationThe process of labeling data to make it usable for machine learning.
Dynamic Host Configuration Protocol (DHCP)A network protocol automatically assigning IP addresses to devices.
Data StreamA continuous flow of data records processed incrementally.
Dart PubDart's package manager for sharing and using libraries.
Data QualityThe measure of data's fitness to serve its purpose in a given context.
Digital TwinA virtual representation serving as the real-time digital counterpart of a physical object.
Dart TestDart's built-in testing framework.
Data FabricAn architecture and set of services providing consistent capabilities across hybrid multi-cloud environments.
Demultiplexer (Demux)A circuit taking a single input and selecting one of many outputs.
Dart FormatterA tool that automatically formats Dart code according to style guidelines.
Data DeduplicationA technique eliminating duplicate copies of repeating data to improve storage efficiency.
Docker VolumeA mechanism for persisting data generated by Docker containers.
Dart DocDart's documentation generator that creates API reference docs from code comments.
Data VirtualizationAn approach allowing applications to retrieve and manipulate data without technical details.
Dart Build SystemA system for transforming and generating Dart code during development.
Data LineageThe lifecycle of data including origins, movements, characteristics, and transformations.
Dart Native ExtensionsA mechanism for extending Dart's capabilities with platform-specific code.
DataOpsA collaborative data management practice improving communication between data teams.
Dart ObservatoryA profiling and debugging tool for Dart applications.
Data ProfilingThe process of examining data for completeness, accuracy, and consistency.
Dart Code MetricsTools for analyzing Dart code quality and maintainability.
Data RetentionPolicies determining how long data should be stored before deletion.
Dart DevToolsA suite of performance tools for Dart and Flutter development.
Data SynchronizationThe process of establishing consistency among data across different systems.
Dart FixA tool for automatically applying fixes to Dart code based on analyzer suggestions.
Data TransformationThe process of converting data from one format/structure to another.
Dart LinterA static analysis tool enforcing coding standards in Dart projects.
Data ValidationThe process of ensuring data is clean, correct, and useful.
Dart Native AssetsA mechanism for bundling platform-specific resources with Dart applications.
Data VersioningThe practice of tracking and managing changes to datasets over time.
Dart Platform InterfaceA design pattern for writing platform-agnostic Dart code with platform-specific implementations.
Data VaultA data modeling approach for historical data tracking in data warehouses.
Dart PluginAn extension adding functionality to the Dart development environment.
Data IngestionThe process of importing data from various sources into a system for storage/analysis.
Dart SDKThe Software Development Kit containing tools for Dart development.
Data PartitioningThe practice of dividing data into subsets for improved performance and manageability.
Dart StandaloneDart programs that run independently outside of browsers.
Data PersistenceThe characteristic of data that outlives the execution of the program that created it.
Dart WebAssembly (Wasm)Compiling Dart to WebAssembly for web deployment.
Data MigrationThe process of transferring data between storage types, formats, or systems.
Dart Web ComponentsA way to create reusable custom elements in web applications using Dart.
Data CompressionThe process of encoding information using fewer bits to reduce storage/transmission requirements.
Dart Web ServerA server-side application written in Dart for handling HTTP requests.
Data ConsistencyThe property ensuring all data copies in a distributed system are identical at all times.
Dart Web StarterTemplates and tools for bootstrapping Dart web applications.
Data ClassificationThe process of organizing data into categories for efficient use and protection.
Dart Web ToolkitLibraries and tools for building web applications with Dart.
Data ArchivingThe process of moving data that is no longer actively used to separate storage for long-term retention.
Dart Web UIA declarative framework for building web user interfaces in Dart.
Data AggregationThe compilation of information from databases with intent to prepare combined datasets for analysis.
Dart Web WorkersA mechanism for running Dart scripts in background threads for web applications.
Data AnalyticsThe science of analyzing raw data to make conclusions about information.
Dart WebSocketsA protocol providing full-duplex communication channels over a single TCP connection in Dart web apps.
Data BindingA general technique that binds data sources from the provider and consumer together.
Dart Web FrameworkA software framework designed to support development of web applications using Dart.
Data CatalogAn organized inventory of data assets in an organization.
Dart Web ComponentsA way to create reusable custom elements in web applications using Dart.
Data FlowThe movement of data through a system comprising software, hardware, or a combination.
Dart Web DevelopmentThe process of building web applications using the Dart programming language.
Data HierarchyThe systematic organization of data, often in a tree-like structure.
Dart Web ApplicationAn application program that is stored on a remote server and delivered over the Internet through a browser interface, written in Dart.
EncryptionThe process of converting readable data into a secret code to prevent unauthorized access.
EthernetA system for connecting computers within a local area network (LAN) using cables.
Email ProtocolsRules that define how emails are sent and received, such as SMTP, POP3, and IMAP.
Edge ComputingProcessing data near its source rather than relying on a centralized cloud, to increase speed and efficiency.
Embedded SystemA computer built into a larger device to perform specific control functions, like in washing machines or cars.
Exception HandlingA way in programming to manage errors or unexpected events during program execution.
Executor ServiceA framework in programming that helps manage and control multiple threads efficiently.
FirewallA network security tool that filters incoming and outgoing traffic based on security rules.
FirmwareSoftware programmed into hardware devices to control their functions, like in routers or printers.
Frontend DevelopmentThe part of web development that deals with how a website looks and interacts with users using HTML, CSS, and JavaScript.
File SystemThe method an operating system uses to organize and store files on a disk or drive.
Fetch APIA modern JavaScript interface for making HTTP requests to get or send data from servers.
Floating PointA number format that represents real numbers with decimal points in programming.
Function OverloadingA feature in some languages where multiple functions have the same name but different parameters.
GatewayA network node that connects two different networks and controls traffic between them.
GPU (Graphics Processing Unit)A specialized processor that handles graphics rendering and complex mathematical calculations.
GitA version control system that helps developers track code changes and collaborate efficiently.
GUI (Graphical User Interface)A visual interface that lets users interact with computers using icons, buttons, and windows instead of text commands.
Garbage CollectionAn automatic memory management process that removes unused objects to free up space.
Gradient DescentAn optimization algorithm used in machine learning to minimize errors by adjusting model parameters.
Grid ComputingA distributed system that connects many computers to work together as one large system.
HTTP (Hypertext Transfer Protocol)The protocol used for transferring web pages and data between web browsers and servers.
HTML (Hypertext Markup Language)The standard language used to create and structure web pages.
Hash TableA data structure that stores key–value pairs for quick data retrieval.
HeuristicA practical problem-solving method that finds good solutions faster when perfect solutions are too complex.
Hosting ServerA computer that stores website files and makes them accessible over the internet.
HyperlinkA clickable link that connects one webpage or resource to another.
Hybrid CloudA combination of private and public cloud services that allows data and applications to move between them.
IP AddressA unique numerical label assigned to each device connected to a network.
IDE (Integrated Development Environment)A software tool that provides programmers with code editors, debuggers, and build automation.
IoT (Internet of Things)A network of physical devices connected to the internet, enabling them to collect and exchange data.
IndexingA database technique used to speed up data retrieval by creating data maps.
InheritanceAn object-oriented programming feature where a new class can use properties and methods of another class.
InterpreterA program that executes code line by line, without the need for compilation.
IPv6The latest version of the Internet Protocol that supports a much larger number of IP addresses.
Java Virtual Machine (JVM)A program that allows Java code to run on any device by converting it into machine code.
JavaScriptA versatile programming language used to make web pages interactive and dynamic.
JSON (JavaScript Object Notation)A lightweight data format used for exchanging information between a client and server.
Jupyter NotebookAn open-source web app used for writing and sharing code, data analysis, and visualizations, often in Python.
Job SchedulerA tool that automatically runs predefined tasks or scripts at specific times.
Join OperationA database operation that combines data from two or more tables based on a related column.
Just-In-Time Compilation (JIT)A technique that converts code into machine language right before it runs, improving performance.
KernelThe main component of an operating system that manages resources like memory, processes, and hardware devices.
KeywordA reserved word in programming languages that has a specific meaning and cannot be used as an identifier.
Knowledge BaseA structured collection of information that helps in decision-making, AI, or customer support.
KubernetesAn open-source platform that automates deployment, scaling, and management of containerized applications.
Keystroke LoggingA method of recording keyboard input, often used for monitoring or malicious activity.
K-Nearest Neighbors (KNN)A simple machine learning algorithm that classifies data points based on their closest neighbors.
Key PairA set of cryptographic keys used in encryption and authentication — one public and one private.
Load BalancerA system that distributes incoming network traffic across multiple servers to improve performance and reliability.
Local Area Network (LAN)A network that connects computers and devices within a small area, such as an office or school.
LibraryA collection of pre-written code that developers can use to speed up software development.
Logic GateAn electronic component that performs basic logical functions like AND, OR, and NOT in digital circuits.
LatencyThe delay between a user's action and the system's response, often measured in milliseconds.
Load TestingA process to check how a system performs under heavy usage or traffic.
Linear RegressionA basic statistical method used in data analysis to predict one value based on another.
Machine LearningA branch of artificial intelligence where computers learn from data to make predictions or decisions without being explicitly programmed.
MainframeA large and powerful computer system used by organizations to handle massive amounts of data and transactions.
MalwareSoftware designed to harm, steal, or damage data and systems — examples include viruses and spyware.
MiddlewareSoftware that connects different applications or services so they can communicate smoothly.
MicroprocessorA small electronic chip that acts as the brain of a computer, processing data and instructions.
ModemA device that converts digital data into signals for transmission over phone or cable lines, and vice versa.
MultithreadingA technique that allows a program to perform multiple tasks at the same time for better performance.
Neural NetworkA computer system modeled after the human brain that helps in recognizing patterns and making intelligent decisions.
NodeA connection point in a network or data structure, such as a computer in a network or an element in a linked list.
Network TopologyThe arrangement of devices and connections in a computer network, such as star, ring, or mesh.
NormalizationA process in databases to organize data efficiently and reduce redundancy.
NAT (Network Address Translation)A technique that allows multiple devices on a local network to share a single public IP address.
NamespaceA container in programming that holds unique names to avoid naming conflicts between variables or functions.
Null ValueA special marker in databases or programming that represents missing or undefined data.
Object-Oriented Programming (OOP)A programming model that organizes code into reusable objects containing data and behavior.
Operating System (OS)Software that manages computer hardware and provides services for programs, like Windows, macOS, or Linux.
Open SourceSoftware whose source code is freely available for anyone to use, modify, and distribute.
OverclockingRunning a computer processor faster than its official speed to improve performance.
OptimizationThe process of improving the performance, speed, or efficiency of software or hardware.
Object DetectionA computer vision technique used to identify and locate objects in images or videos.
Output DeviceHardware that displays or outputs data from a computer, such as a monitor or printer.
PythonA popular high-level programming language known for its readability and use in data science, AI, and web development.
PacketA small unit of data transmitted over a network, containing both control and content information.
Parallel ProcessingA method where multiple processors execute different parts of a program simultaneously to speed up performance.
ProtocolA set of rules that define how data is transmitted and received between devices on a network.
PhishingA cyber-attack technique where attackers trick users into giving away personal or financial information.
Proxy ServerAn intermediary server that acts between a user and the internet to provide security or anonymity.
Primary KeyA unique identifier in a database table used to distinguish each record from others.
QueryA request made to a database to retrieve or modify information.
Quantum ComputingA new type of computing that uses quantum bits (qubits) to perform calculations much faster than classical computers.
QueueA data structure that stores elements in a first-in, first-out (FIFO) order.
Quick SortAn efficient sorting algorithm that uses the divide-and-conquer technique to organize data.
QoS (Quality of Service)A feature in networking that manages data traffic to reduce delays and improve performance for important applications.
Query OptimizationA process in databases to choose the fastest way to execute a data retrieval command.
RAM (Random Access Memory)A temporary memory used by computers to store data and instructions while programs are running.
RouterA network device that directs data packets between computers and networks.
Runtime EnvironmentThe environment where a program is executed, including memory, libraries, and dependencies.
RecursionA programming technique where a function calls itself to solve a smaller instance of the same problem.
REST APIA web service that allows systems to communicate using standard HTTP methods like GET, POST, PUT, and DELETE.
RAID (Redundant Array of Independent Disks)A storage method that combines multiple hard drives for better performance or fault tolerance.
Regression TestingTesting done to ensure that new code changes don’t break existing functionality.
SQL (Structured Query Language)A programming language used to manage and query data in relational databases.
StackA data structure that follows the last-in, first-out (LIFO) principle for storing and accessing elements.
ServerA computer or software that provides data or services to other computers over a network.
Software Development Life Cycle (SDLC)A process that describes the steps involved in developing software — from planning to deployment.
Source CodeThe human-readable form of a program written in a programming language.
ShellA command-line interface that allows users to interact with an operating system.
ScrumAn agile project management framework used for developing software in small, iterative steps.
TCP/IPA set of communication protocols that define how data is sent over the internet.
TokenizationThe process of breaking text or data into smaller parts, often used in natural language processing or security.
ThreadThe smallest unit of execution within a process, allowing multiple tasks to run simultaneously.
Two-Factor Authentication (2FA)An extra layer of security requiring two forms of verification, such as a password and an OTP.
ThroughputThe rate at which data is processed or transferred over a system or network.
TensorFlowAn open-source framework developed by Google for building and training machine learning models.
Testing FrameworkA set of tools and libraries used to write, organize, and run automated tests for software.
URL (Uniform Resource Locator)The address used to access a specific resource on the internet, like a webpage.
UI (User Interface)The part of a system that users interact with, including buttons, menus, and visuals.
UML (Unified Modeling Language)A visual language used to design and document software systems.
UDP (User Datagram Protocol)A communication protocol that sends data quickly but without checking if it was received correctly.
User Experience (UX)The overall feeling a user has while interacting with a system or product.
UnicodeA universal standard for encoding text in almost every writing system used around the world.
Utility SoftwarePrograms designed to maintain and optimize computer performance, such as antivirus or file management tools.
Virtual Machine (VM)A software emulation of a physical computer that runs an operating system and applications independently.
Version ControlA system that tracks changes to code or documents, allowing collaboration and history management, like Git.
Virtual Reality (VR)A technology that creates a simulated environment that users can interact with using special devices.
VPN (Virtual Private Network)A service that encrypts your internet connection to provide privacy and access to restricted content.
VisualizationThe process of creating visual representations of data to make it easier to understand and analyze.
Vector GraphicsImages created using lines and shapes instead of pixels, which can be resized without losing quality.
Web DevelopmentThe process of building websites and web applications using languages like HTML, CSS, and JavaScript.
Wireless NetworkA network that connects devices without cables, using radio waves or Wi-Fi technology.
WebhookA method for one system to automatically send real-time data to another system via a URL.
White Hat HackerA security expert who tests systems for vulnerabilities legally to improve security.
WorkflowA sequence of tasks or processes that are followed to complete a job efficiently.
Word EmbeddingA technique in natural language processing to represent words as numerical vectors for machine learning.
XML (eXtensible Markup Language)A flexible text format used to store and transport data between different systems.
XPathA language used to navigate and find specific elements in an XML document.
XSS (Cross-Site Scripting)A security vulnerability that allows attackers to inject malicious scripts into web pages viewed by others.
XOR GateA digital logic gate that outputs true only if the inputs are different from each other.
YAML (YAML Ain’t Markup Language)A human-readable data format used for configuration files and data serialization.
YieldA keyword in some programming languages that allows a function to pause and return a value, resuming later.
Yellow Book StandardA set of guidelines for programming languages and systems to ensure compatibility and quality.
YouTube APIAn interface provided by YouTube to allow developers to access videos, channels, and playlists programmatically.
Zero-Day VulnerabilityA security flaw that is unknown to software makers and can be exploited by attackers before being fixed.
Zooming User Interface (ZUI)A graphical interface that allows users to zoom in and out of content for better navigation and focus.
Z-ScoreA statistical measure that describes how far a value is from the average in terms of standard deviations.
Zip CompressionA method to reduce the size of files by compressing data, making storage and transfer faster.
Zombie ProcessA process in computing that has finished execution but still occupies system resources until fully removed.