Skip to page content
Client Hub Tel 01892 830111

IT jargon glossary

Does technology talk have you stumped? Do you switch off when you hear terms like ‘DNS filtering’? Fear not! Our handy IT jargon glossary simplifies IT support terms and services.


A device that enables computers and other devices equipped with wireless capabilities to connect with a wired network.

API stands for Application Programming Interface. It is a collection of protocols and tools written in programming languages like C++ or JavaScript, which dictate how two software components should interact. APIs operate in the background, enabling users to find and access the information they seek.

AI, or artificial intelligence, refers to the simulation of human intelligence in machines, particularly computer systems. It operates through algorithms within a computerized system, which are precise sets of instructions that enable a computer to solve problems or perform tasks. Learn about Copilot, Microsoft’s answer to AI.


Business continuity is the capacity of an organization to maintain critical operations during a disruption, such as a cyberattack or natural disaster. A business continuity plan (BCP) outlines the procedures and protocols an organization implements to ensure that essential functions proceed with minimal interruption.

Business Intelligence (BI) encompasses the technologies, software, and methodologies employed by companies to gather, examine, and display data. Making decisions based on data is a fundamental principle of BI.

BYOD stands for “Bring Your Own Device,” a policy allowing employees to use their personal devices to connect to their organization’s network and access work-related resources.


Caches are components, either software or hardware, that store data temporarily to fulfill future requests more swiftly and effectively.

The central processing unit (CPU) is the main hardware component of a computer system, tasked with processing and executing instructions and programs. CPUs are situated on the computer’s motherboard.

Is an open language modelling system (AI) owned by Microsoft.

A cookie is a small piece of data that you may be prompted to accept when connecting to certain servers through a web browser. It serves as a means of identification throughout your session and is specific to, and only sent to, the server that created it.

Customer Satisfaction Score

Every time a ticket is resolved, we ask a one question survey, “How did we do on this request?”, so we understand what each end user thinks of the service we have provided. In the industry, anything 98% and over is classed as World Class, and we continually achieve this and often have 100% Customer Satisfaction.

Cyber Essentials

Cyber Essentials is a Government-backed, industry-supported scheme to help organisations protect themselves against 80% of common cyber-attacks. It includes a series of annual checks and technical controls to ensure you are efficiently protected against cyber threats, including hacking, phishing or password attacks. To pass the certification, you will need evidence in support of your answers.

Find out more about how we can get you Cyber Essentials certified.

Cybersecurity is a field within technology dedicated to safeguarding data and devices from malevolent entities. Professionals in cybersecurity employ their technical expertise to evaluate systems, remedy vulnerabilities, and construct secure defenses against damage and theft.


Dark Web Monitoring

The Dark Web is a layer of the Internet, accounting for 6% of the total Internet, that is accessible via specialist browsers. The Dark Web is considered a haven for criminal activity, from the sharing of illegal information to the sale of arms and drugs. Company credentials that are stolen or leaked will find its way onto the dark web, whether freely shared or sold in market places. Employees often use the same password for multiple services on the web, such as CRM, e-commerce sites, and social media exponentially increasing the risk and impact of any breach.

Dark Web Monitoring keeps a close eye on whether your business data is available on the Dark Web, provides you with daily updates of any accounts that are exposed so you can take immediate action averting any threat.

Find out more about our Dark Web Monitoring service.

The Digital Visual Interface (DVI) has three variants DVI-A, DVI-D and DVI-I. There is also the Mini-DVI and Micro-DVI, but these were largely used on early Apple computers. The DVI created in 1999 to supersede the VGA, moved connections from analogue to digital allowing for better picture quality. This connection was superseded quickly and therefore is not as commonly found today.

More information about display ports.

Another widely used connection, it is primarily used to connect a video source to a display device. It’s ability to deliver high-quality video and audio makes it a very popular connection type for professionals and gamers.

There are three core variants; DP 1.2, DP 1.3 and DP 1.4. Each type has slightly different capabilities.

More information about display ports.

DNS filtering

DNS (Domain Name System) filtering refers to the process of using DNS to block or redirect specific domain names or internet addresses. This can be done at the network level to prevent access to certain websites or online services, or to redirect traffic to a different location.

DNS filtering is often used to block access to known malicious or unwanted websites, such as those used for phishing or distributing malware.

F


A firewall is a network security device that establishes a barrier between a trusted and an untrusted network. For instance, it can prevent internet traffic from entering your private network. Functioning as a gatekeeper, it manages both incoming and outgoing traffic based on a defined set of security rules.

Fragmentation refers to the dispersal of parts of the same disk file across various areas of a disk. This phenomenon occurs as files are deleted and new ones are added, leading to a scattered file system.


A type of artificial intelligence (AI) technology is capable of generating various forms of content, such as images, audio, text, and synthetic data.

GIFShell represents a novel attack method where attackers can transmit malicious files, execute commands, and carry out data exfiltration through GIF images.

1024 x 1024 x 1024 bytes, or 2 to the 30th power, is commonly referred to as a gigabyte. It’s generally adequate to approximate a gigabyte as about one billion bytes or 1000 megabytes.

A Graphical User Interface (GUI) is a type of digital interface that allows users to interact with electronic devices through graphical elements like icons, buttons, and menus.


The High-Definition Multimedia Interface (HDMI) connection has been going strong since 2002. It’s ability to transmit high-definition uncompressed video data between devices is the reason everyone swiped right on this connection!

Its developed over the years, becoming smaller and smaller.

More information about display ports.

HyperText Markup Language, or HTML, is a language utilized for creating web pages. It employs a variety of instructions and tags to determine the appearance of the document.

The HyperText Transfer Protocol is a set of rules that govern how a web server and a browser interact. For instance, when you enter a URL in your browser, it sends an HTTP command to the web server, instructing it to fetch and transmit the desired web page.


The Internet of Things, commonly known as IoT, constitutes a network of physical objects. These objects are capable of exchanging data autonomously, without the need for human interaction. IoT encompasses more than just computers and machines; it can integrate any item equipped with sensors and a unique identifier (UID).

An Internet Protocol address, commonly known as an IP address, is a numerical label assigned to each computer. It is used for identifying and locating computers on the network as they use the Internet.

ISO 27001

This is the only auditable international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber-attacks, hacks, data leaks or theft. Learn more about ISO 27001.

ISO 9001

This certification ensures that a quality management system is in place. The system must meet certain criteria, including strong customer focus, the motivation and implication of top management, the process approach and continual improvement. Learn more about ISO 9001.


Malware, short for malicious software, is the most prevalent type of cyberattack targeting businesses and organizations. It is crafted to interfere with and disrupt computer systems, including mobile devices.

Multi-Factor Authentication (MFA), sometimes call 2FA, is an additional layer of security when accessing accounts. Found on most accounts now, from Facebook, X (formerly Twitter), LinkedIn and Microsoft. This process requires you to type in your password AND then authenticate that you are allowing access. This can be done via email, SMS or via an Authenticator application, such as Microsoft Authenticator or Google Authenticator.


NIS2

NIS2 (Network and Information Security version 2) is the latest EU directive that aims to improve the cybersecurity and resilience of organisations that provide particular services. The legislation comes into force on the 18 October 2024. As NIS2 is European legislation, it doesn’t affect all UK businesses, just those trading with or in Europe.


Onsite support

Onsite IT support is when technical assistance and troubleshooting services are given to computer users at the office or place of work. This can include setting up new equipment, troubleshooting and repairing hardware and software issues.

An operating system (OS) is the system software that manages computer resources and processes. It is responsible for the computer’s capability to run and execute programs. Operating systems allow you to interact with your computer without requiring knowledge of its language.

OSINT is an acronym for Open Source Intelligence. Essentially gathering and using information freely scattered about the interweb. More information on how OSINT can support your business security strength.


Patch Management

Patch management is the process of identifying, downloading, testing, and installing software updates and fixes, commonly known as “patches”, in order to keep software programs and operating systems up-to-date and secure. These patches address security vulnerabilities, fix bugs, and add new features. Patch management typically includes a combination of automated and manual processes.

Effective patch management can help prevent security breaches by closing vulnerabilities that could be exploited by attackers. It can also help keep software running smoothly by addressing bugs and compatibility issues.


Quarterly Assessment

Every 3 months our proactive insights and alignment teams will carry out a risk assessment in order to reduce risk and downtime while optimising the IT. They ask the question “what more could we have done to prevent this ticket being needed?”. By analysing, problem-solving and automating on a regular basis ensures customer issues are reduced through Continual Service Improvement (CSI).


SafeSupplier offers a robust, streamlined, consistent and effective supplier on-boarding and management solution, that demonstrates supplier compliance to regulatory requirements, international standards and industry best practice in the supply chain. Select Technology has been awarded verification from SafeSupplier for demonstrating their ethical, environmental and financial credentials, to help clients assess compliance within their supply chain.

The Security Operations Centre (SOC) is responsible for continuously monitoring, preventing, detecting, investigating, and responding to cyber threats. SOC teams safeguard the organization’s assets, such as intellectual property, personnel data, business systems, and brand integrity. With our WorkTogether IT support service, you’ll have a SOC team working to ensure that your business is secure.

A slightly contrived acronyms that businesses all love so much. For more information read about STEP.


Technical Account Manager

A Technical Account Manager (TAM) acts as a liaison between the customer and the IT provider. The TAM is responsible for ensuring that the company’s technical needs are met and that the services provided by the technical teams are of high quality and align with the company’s goals and objectives. The TAM also acts as a primary point of contact for the company for any technical issues or concerns, and works closely with the company to ensure that all technical matters are handled efficiently and effectively.


USB-C is the newest connector available, driven by regulation and reducing costs, is now becoming the standard connection. USB-C is capable of data, video, audio and power transfer. Most new devices will utilise this cable, including future apple devices.

More information about display ports.


A Virtual Private Network (VPN) is a secure, encrypted internet connection. VPN services are designed to create a protected, private network that ensures the safe transmission of data from network devices.

Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical machines.

Ahh, Video Graphics Array (VGA), nostalgia kicking in now. This connection has been around since 1987, and is extremely common (even today), found on monitors, televisions, projectors and PCs. VGA is an analogue connection, and therefore it has a limited ability to transmit high-definition content. Modern devices are beginning to drop this connection type for newer connectors that are able to transmit high-def content.

More information about display ports.

W


A Wide Area Network (WAN) is a network that spans a broad geographical area. The internet serves as a prime example of a WAN.

Contact Us