7172 Graham Rd, Suite 115 | Indianapolis, IN 46250

Tech Terms for Non-tech Folks

API:

Stands for “application programming interface.” An API is the middle man running messages between two applications, allowing them to share information. So if you need your customer relationship management (CRM) system to give information to your email management application, an API is the man for the job.

Bugs:

A computer bug is anything that causes an incorrect or unexpected result, or to behave in unintended ways.

Browser Cache:

Think of your browser cache as an entryway organizer. It’s a handy place to drop things you need to be easily accessible such as your keys, sunglasses, or shoes. 

This is where your browser (Chrome, Firefox, etc.) saves the data needed to see a website, like images and HTML. Then when you revisit that page, it will take less time to load because you’ve already stored some of the information.

Cellular internet backup:

If you’ve ever used your phone as a hotspot, this type of wireless backup functions very similarly. Your cellular service provider can install a cellular wireless router with a SIM card so you can pull WIFI from it. Learn more

Cookies:

Cookies are kind of like name tags for websites, though they can be much more detailed. When you visit a site for the first time, it slaps a name tag on you and keeps track of your preferences. That way, when you come back, the page gets a reminder of who you are and what you like. Think about login credentials or language settings.

But it’s also why you may feel like a certain brand or type of product is stalking your browsing. It’s because they kind of are—through cookies.

GUI:

Stands for ‘graphical user interface.” Utilizing a GUI is the reason all our computers no longer show line after line of green text in order to operate. Instead of inputting all the commands through text, you just simply click on an icon or touch an app on your phone. 

HTML:

Stands for “hyper text markup language.” HTML is the standard language used to create web pages. It tells the browser how to display the structure of content on the webpage, such as title, headers, footers, and links.

Firewall:

Imagine having a bouncer standing at the entrance of your organization’s network infrastructure. They turn away any harmful traffic that could potentially harbor threats or security issues. That’s your firewall.

Phishing:

Similar to its homophone, fishing, malicious characters are throwing out bait to see what information they can catch. Cybercriminals send out emails posing as a legitimate source in order to persuade their victims to reveal sensitive or personal information that can then be used against them. Learn more.

Managed IT:

Managed IT provides your business access to a team of experienced IT professionals and services for the cost of roughly one full-time employee. This model includes Service Level Agreements, which places up-time and support responsibilities on the managed It team, allowing you to forecast monthly IT costs and minimizes major issues with a proactive approach. Learn more.

Ransomware:

Ransomware is a type of malware that locks the victim out of their own data by encrypting it and demands a ransom be paid for access to the data. These attacks can devastate businesses, especially when they hold sensitive or confidential information. Learn more

Remote Network Monitoring:

This is the practice of accessing a system remotely to identify issues and work to fix them without the physical presence of a technician. That means no wait times for the technician to arrive and instant attention to your issue, allowing any affected employees to return to work fast. Learn more.

Spam:

Spam messages in your inbox can be wasteful or threatening. Either way, you don’t want them, and you definitely didn’t ask for them. 

VPN:

Stands for “virtual private network: Think of a VPN as a series of spies carrying your messages and keeping them secure. You give your data to a spy who encrypts it and sends it (through the internet) to a different spy with a decoder ring who then delivers it to the correct place. The same process is repeated in the other direction; encrypting and decrypting your data to ensure its safety.

VoIP:

Stands for “Voice over Internet Protocol.” A phone service ran through the Internet. You can make calls, receive messages, and generally enjoy all the benefits of a traditional phone plus some benefits only possible thanks to smart devices and better user experience design. Learn more.

Some Slang to Get You In With The Cool Kids

AFK:
Away from keyboard

“I didn’t see your messages, I was AFK.”

LMAO: 
Laughing my a** off

“LMAO! That is hilarious!”

LOL: 
Laughing out loud

“That video had me rolling lol”

IRL: 
In real life

“My online character in this game is much more fun than my IRL job. I’m an accountant.”

IMO:
In my opinion

“Not that you asked, but IMO you should definitely work with Exact IT.”

N00b: 
A novice or newcomer

“Wow, what a N00b. They don’t even know the first rule of Fight Club.”

Related Posts