Computer Terms & Jargon

Help and LadderComputer jargon is not new, I’ve been in the computer business for over 40 years and we’ve always used jargon as a sort of shorthand in our communication. However, because of the Internet and the global discussion of computers, security and a multitude of other technology subjects; the world is now exposed to an immense amount of computer jargon. So here are some definitions to help you become knowledgeable on some of the more frequently used terms. Feel free to use them to impress your less-informed friends.

Getting Connected

  • BROADBAND: Broad bandwidth networking. High-speed Internet connections, like DSL (Digital Subscriber Line), Cable Internet, and 3G (Third Generation) cellular services.
  • DSL: Digital Subscriber Line. One of the most common ways to bring Internet to homes and small businesses over a telephone line at up to 12 Megabits/second.
  • CABLE OR CABLE INTERNET: The other most common way to bring Internet to homes over cable TV lines at speeds ranging from 1.5 to 50 Megabits/second.
  • FiOS: Fiber-Optic Service. An emerging technology that provides Internet to homes and offices over fiber-optic cables at speeds from 15 to 50 Megabits/second.
  • WI-FI: Wireless Fidelity. The most common kind of short-range wireless networking–about 300 feet–at speeds of up to 108 Megabits/second.
  • EDGE or EVDO: An older kind of wide-area wireless networking—like a whole city–based on first and second generation cellphone technology with speeds ranging from 300 to 400 kilobits/second.
  • 3G: Third Generation cellular service. Enhanced wide-area wireless networking at speeds of up to 14 Megabits/second.
  • 4G: Fourth Generation cellular service or WiMAX. An emerging wide-area networking technology that promises a range of 10 miles and speeds of up to 100 Megabits/second.
  • ETHERNET: A way of connecting computers to networks using a cable at speeds ranging from 10 to 10,000 Megabits/second.
  • FIREWALL: Software or hardware that prevents outsiders from accessing a computer or network.
  • ROUTER: A device that finds the best route for sending information between networks.
  • IP ADDRESS: Internet Protocol Address. Every computer on the Internet is identified by a unique set of numbers known as an Internet Protocol address–usually four numbers separated by dots, for example: These numerical addresses are normally invisible to users and are translated into familiar Web addresses, like


  • VIRUS: A self-replicating program designed to cause damage or mischief that inserts itself into a software program on your computer. Viruses spread from computer to computer, most often through infected emails or websites.
  • WORM: Similar to a virus, but worms are self-contained, spread via networks, and do not need to become part of another program in order to spread. Worms infect your operating system and act like a program.
  • TROJAN HORSE: A malicious program that may appear harmless—or even useful—but can also conceal and download other malware that compromises the security and functioning of your computer.
  • RANSOMWARE: A cyber-extortion scheme in which thieves use malware–like phony security programs–to take control of your computer and demand that you pay a ransom to regain control.
  • SPYWARE and ADWARE: Spyware is a malicious program that installs itself on your computer surreptitiously and monitors and reports your activities and personal information to third parties. Adware is a kind of spyware that generates annoying pop-up ads.
  • KEYLOGGERS: Spyware that monitors your keystrokes surreptitiously and sends the information to a “Bad Guy.”

Bad Guys

  • HACKERS AND CRACKERS: Individuals who break into systems with malicious intent, destroy data, steal copyrighted software or confidential information, and perform other destructive or illegal acts with computers and networks.
  • VULNERABILITIES AND EXPLOITS: Your computer is vulnerable when a hardware or software flaw makes it possible to compromise its security and smooth operation. An exploit is a software application or program that takes advantage of a vulnerability to attack your system.
  • SNIFFING: Listening in on a network in order to capture and steal sensitive information.
  • SPOOFING: An attack in which a person or program you shouldn’t trust masquerades as a person or program you do trust. For example, an attacker forges an email address in order to make you believe it’s from someone you know and trust.
  • PHISHING: A widespread form of Internet fraud that aims to steal valuable information such as credit card and social security numbers and usernames and passwords, by sending you misleading emails designed to lure you into visiting phony or rigged websites.
  • IDENTITY THEFT: Cybercriminals steal identities by overhearing conversations on cellphones, intercepting faxes and emails, hacking into computers, employing telephone and email scams, and phishing the users of online services.
  • SOCIAL ENGINEERING: Deceptions by criminals posing as someone you trust in order to get you to divulge sensitive information.

Please comment on this subject; we all learn from each other when our views and opinions are shared.

Don’t miss an article.  If you enter your email address in the Email Subscriptions box on the right column of this page, I’ll send you an email when a new article is posted.  I don’t share your email address with anyone…no one; I hate spam too.  Please share my site with your friends and family.  Thanks.

Home computing is a blast…keep it safe, productive and enjoyable.

Best regards,




1 Comment

Filed under Internet, security, Wanna Know

One response to “Computer Terms & Jargon

  1. Cappydawg

    Hi Paul,
    Nice article. Very handy for the less experience computer users. I am going to pass it on to my friends who are always asking me these questions. One thing I have suggested to my friends is pickup a computer dictionary and keep it handy when you come across a term they don’t understand. My best friend took this suggestion and it has really helped her.

    Thanks. Using a computer dictionary is an excellent idea! I appreciate your input…and for stopping by.

What do you think?

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s