Tech Concepts & Terminology
Infrastructure
Applications & Software
Software Development Concepts
Data & Database Fundamentals
100

The basic “language” computers use

Binary

100

A device that forwards traffic between networks using IP addresses.

Router

100

Software that manages hardware resources and provides services to applications.  

OS 

100

A set of step-by-step instructions to solve a problem.

algorithm

100

A collection of related data organized for easy access and management.

Database

200

A measurement of how many bits of data can be transmitted per second

Bandwidth

200

A device that connects devices in a LAN and forwards frames using MAC addresses.

Switch

200

Software updates that fix vulnerabilities and bugs.  

Patches

200

A mistake in code that causes incorrect behavior.

Bug

200

A database structure where data is stored in rows and columns.

Table

300

The process of turning readable data into coded data to protect confidentiality.

Encryption

300

A security feature that separates a network into smaller broadcast domains.  

VLAN

300

A program that looks like a legitimate application but performs harmful actions

Trojan

300

A secure development practice where you search for weaknesses before release.

Code Review

300

A field (or set of fields) that uniquely identifies each record in a table.

Primary Keys

400

A unique identifier assigned to a network interface card, typically shown in hex.

MAC address

400

A protocol that automatically assigns IP addresses and network settings to clients.  

DHCP

400

A tool built into many operating systems that lets you remove or roll back software changes

System Restore

400

The process of recording changes to code so teams can collaborate and roll back if needed.  

Version Control

400

A backup approach that copies only the data that changed since the last backup.

Incremental backup

500

A troubleshooting method where you test one variable at a time to narrow the cause of a problem.

Divide and Conquer

500

A concept where computing resources (servers, storage) are delivered over the internet on demand.

Cloud Computing

500

The “least risky” way to test a new application before deploying it to everyone.

Testing sandbox / pilot / staged rollout

500

A security risk where untrusted input is treated as code or commands (often seen in web apps)

Injection

500

 A policy or principle that ensures users only access the data they need to do their job.  

Least privileges

M
e
n
u