4k. Application. Audiostream. Add-On. Artificial intelligence. Barrier Free. Beta Browser. Cache Call To Action. CAPTCHA. Case. Chatbot. Cloud. Content. Content Delivery Network. Cookies. Data management. Digital Signage. Directory. DDoS. End device. Freeware. GDPR. Hardware. HTML. HTTP. HTTPS. Hyperlink. Interface. IT. Local Area Network. Module. Monitoring. Opt-In. Operating System. Plug-In. Phishing. Player. RSS-Feed. Remote. Rich Text. RAM. Software. SaaS. SSl. Spam. Search engine. User experience. Use Case. VPN. WLAN. 404 Page.
4K-resolution promises a high quality picture resolution on monitors. The high number of pixels ensures a first class as well as detailed presentation of pictures in the 3840 x 2160 format.
Applications are defined as computer programs or “apps” to provide users with a desired functionality or to solve a problem. Example: A weather app.
Streaming audio is a function that allows audio data to run continuously over a computer network.
Add-Ons are additional applications for an already existing application to qualitatively expand usage and functionality. The main goal is to improve user experience.
Artificial intelligence (AI)
Artificial intelligence deals with automation of intelligent behavior. This sub area of informatics deals with development of applications where machines are able to provide human-like cognitive services.
Through additional applications, physical and mentally handicapped people can use devices without any problems. There is, for instance, software which reads out content or makes letters bigger.
The term “beta test” has its roots in software development. Goal is to execute a test phase of not fully developed software in order to find flaws within the application and to exploit potential for improvement.
The browser is a program which ensures access to websites on the internet. The most known browsers are Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
The cache is a storage which ensures access to background media. On websites, loading times are shortened for returning users because the data was already stored in the background during the previous visit.
The Call-To-Action is a request to take action. Users are motivated by messages (“click here”, “read more” etc.) to interact with a system. The CTA is especially important for marketing strategies so that users can, for example, make purchases or pass on their data to companies.
CAPTCHA is the short term for “Completely Automated Public Turing Test to Tell Computers and Humans Apart”. A good example is the usage of a contact formula on a website: Users often have to pass the CAPTCHA test (e. g. solving a math problem) before they can send a message. The goal is to prevent the website owner from spam.
The case of a computer ensures the recording of all hardware components to protect them and to use them unrestrictedly.
Chatbots are applications which use artificial intelligence to communicate. Users can, for instance, ask questions and the chatbot will answer them. Example for chatbots: You are asked to chat on a website and to ask your questions.
Computing resources are provided by a server as a service. Users make a request to retrieve the data or applications and they are then delivered via a centralized location.
The term describes all “contents” that are published on a website (e. g. blogs) or on social media channels. The goal is to reach a broader audience, to expand the positive reputation of a company and to execute marketing strategies.
Content Delivery Network
A content delivery network, short “CDN”, is used for the rapid provision of data and applications. Resources of a central cloud are additionally saved on a regional server to provide data faster when requested.
Cookies are text modules which are saved in a browser through a website. Cookies are therefore useful to save interim steps of a user but his behavior is analyzed as well to to gain data for marketing campaigns.
Data management describes the entirety of all measures to support business processes based on available data to optimize existing working processes.
Digital signage describes a modern form of media reproduction. The scope of application includes advertising, information, warnings and safety notices which are displayed and shown through a digital screen.
“Directory” describes directories for better user navigation. Examples are web-directories or topic overviews.
DDoS stands for “Denial of Service” and describes the non-availability of an internet service which should be available. Most common reason is the overload of a data network.
Describes a device which is connected to a private or public communication or data network. This ensures the communication and data transfer between participants. Examples are digital signage and tablets.
In IT, freeware describes the free provision and usage of software. As software is protected by copyright, it’s not allowed to change freeware.
The GDPR serves to protect the personal data of natural persons. The focus is therefore on the protection of fundamental rights.
Hardware is the material component of IT. Digital components (e. g. programs or applications) are software, on the other hand RAM and processor belong to the hardware.
HTML stands for “Hypertext Markup Language”. It’s a description language to structure electronic documents such as texts or pictures. Through digital screens, structured data is displayed and shown user friendly to the readers. Since 2014, HTML5 and its improved functions have primarily been used. Some of these functions include better multimedia support and performance.
HTTP stands for “Hypertext Transfer Protocol” and is a stateless protocol to transfer data through a computing network. With HTTP websites are loaded and it regulates the communication between servers and web browsers.
Basically, HTTPS is the same as HTTP – a stateless protocol to transfer data through a computing network. The difference to classic HTTP is that HTTPS transfers data encrypted.
Hyperlinks are links with a text reference. In blog articles, for example, hyperlinks can be recognized by the fact that certain words are highlighted in blue and underlined. When clicked, a new page or document opens.
An interface describes a transition point between different components of an IT-system to realize data exchange and data processing.
IT is the short term for “Information technology” and includes all areas of electronic data processing. Execution is realized through software and hardware infrastructure.
Local Area Network (LAN)
“Local Area Network” is the description for a network that is locally limited to a small region. If the network reaches over a bigger area, then it’s either a Metropolitan Area Network (MAN) or a Wide Area Network (WAN).
Modules are elements within a system or a device which build a functional unit together. Every module has a specific function or provides a service.
Simply explained, monitoring describes the observation of a system and its functions. The goal is to figure out important key numbers but also to provide a flawless service.
Opt-in is a term from marketing and describes the consent procedure for subscribing to a newsletter. Companies may only send advertising emails or messages if users expressly agree to a registration.
The operating system is the base for using a computer. The interaction between software and hardware ensures a user friendly application and control as well as monitoring of a data processing system.
Plug-Ins provide expansion for software applications. Unlike add-ons, plug-ins are not imposed on an existing software because they are independent applications.
Phishing means that fraudsters send fake mails to obtain data or accept payments. Well-known examples are mails from fake amazon or PayPal addresses asking to update the customer’s account.
Often referred to as a “media player”. It describes computer programs which display media content such as pictures or videos.
The “Rich Site Summary Feed” offers users the option to get access to updated content. Podcasters often host their content on a provider’s website but upload their content on many different websites (e. g. spotify, soundcloud and amazon).The RSS feed ensures that on a hosters website uploaded content is also provided on other webpages.
Remote means that something isn’t in immediate proximity but connected to each other. For example, many software applications are hosted “remote” – that means that maintenance and updates are completed through a central location.
The rich text format is a predefined data for text processing. With that, the possibility to display text documents as formatted elements or graphics is given.
RAM stands for “Random Access Memory” and describes a central computer component to provide data storage space fast. The short term data storage is important to ensure that a computer device can quickly access and run applications.
Software is a general term for all executable programs and belonging data. In many cases software also describes a script that defines which functions a controlled device has to fulfill.
SaaS is the short term for “Software as a service” and offers users a service which IT-infrastructure is hosted through an external provider. The software can be installed and used for a (monthly) fee.
The “Secure Sockets Layer” certificate serves as a safeguard of internet connections and sensitive data which is transferred between two systems. A valid SSL certificate ensures that third parties can’t decipher a data exchange.
The term spam describes unwanted emails. They are mostly advertising mails which were sent without prior consent (Opt-In).
Search engine is a collective term for all internet pages which are used for research purposes. The most known one is Google, followed by Bing.
User experience describes how well the interaction between users and application works. The main goal is to improve experience for potential customers and users as well as to improve the interaction with a system or device. Examples for a bad UX are messy websites or digital applications with a bad structure.
Use cases describe the documentation of system functions. It doesn’t matter if the system exists or if it’s still in the stage of planning because the main goal is to describe the behavior of a system from the user’s perspective.
The VPN (Virtual Private Network) encrypted internet traffic in unsafe networks to ensure privacy. A VPN encrypted, for instance, IP-addresses to protect data from access of third parties.
The Wireless Local Area Network is a local wireless network to ensure a connection between the end device and the internet.
404 is an error code. It is used on websites to show that a requested page or data is not available.