A

 

 

 

 

 

Algorithm A set of steps which will solve a problem. An algorithm can be seen as “the solution to a problem” and should be written as short, clear, logical steps. Algorithms are the basis of all program code and applications that you use.

 

 

 

 

 

 

 

Image by:
PandoraFMS

 

 

 

Abstraction The process of removing (obscuring) unnecessary details or elements from a problem. When solving a programming problem or making an algorithm, abstraction ensures you focus only on the problem.

 

 

 

 

 

 

 

Example of abstraction taking place
Image by:
albert.io

 

 

 

Array An indexed (each element is numbered) collection of data stored under the same name in a computer program. Think of an array as a table with numbered rows.

 

 

 

 

 

 

 

Arrays can be more than one dimensional
Image by:
Oreilly

 

 

 

Accumulator A register in ‘Von Neumann Architecture’ CPU’s. Data to be executed or the results of execution are often stored in the Accumulator

 

 

 

 

 

 

 

Inside the CPU
Image by:
Teach ICT

 

 

 

Address BusA connection between the CPU and RAM. Used by the CPU to send the address to the memory controller of the instruction or data that it wants. The memory controller will look in the address sent down the address bus and return the data held at that address down the data bus.

 

 

 

 

 

 

 

Series of system buses
Image by:
wikipedia

 

 

 

ALU – Arithmetic and Logic Unit – One of the most important components of a CPU, this is where any logical or mathematical instructions are carried out.

 

 

 

 

 

 

 

Image by:
Computer Hope

 

 

 

 

 

 

B

 

 

 

 

 

Bandwidth A measure of the amount of data that can travel through a cable/wireless connection in a given time frame. Usually measured in Mega Bits per second (Mbps)

 

 

 

 

 

 

 

Fibre optics with binary data
Image by:
TechTarget

 

 

 

Binary A number system. Each digit may only be a 1 or a 0 (also known as a “bit” – see below).

 

 

 

 

 

 

 

Binary code wall
Image by:
Medium

 

 

 

Bit The smallest quantity of storage in a computer system. A bit is either a 0 or a 1.

 

 

 

 

 

 

 

8 Bits is 1 Byte
Image by:
Freesoft

 

 

 

Byte A collection of 8 bits. Can be used to represent any number up to 255 or 256 combinations of 0’s and 1’s.

 

 

 

 

 

 

 

Image by:
people.scs.carleton

 

 

 

Bus A wire or collection of wires used to connect different components together. Used to send data between devices, for example between the CPU and RAM.

 

 

 

 

 

 

 

Image by:
wikipedia

 

 

 

Backup An exact copy of data which is stored externally from the original. Can be full or incremental. simply making a copy of a file does not make it a backup, it must be stored away from the system it was originally on.

 

 

 

 

 

 

 

Image by:
PCWorld

 

 

 

Brute ForceA method of gaining usernames, passwords and other credentials by systematically trying all possible combinations of a username/password until successful.

 

 

 

 

 

 

 

Image by:
Comparitech

 

 

 

Boolean A data type. Specifically, one which may only be in one of two states – e.g. True or False.

 

 

 

 

 

 

 

Image by:
Humanengineers

 

 

 

Blu-Ray A type of optical storage used to hold software and video content. Typical capacity is 25 to 50Gb.

 

 

 

 

 

 

 

Image by:
databackuponlinestorage

 

 

 

C

Cache A small amount of memory found inside the CPU. It runs at or near the speed of the CPU and is used to hold frequently used/accessed instructions and data. Cache speeds up the CPU as it does not have to wait for data to be read from RAM.

 

 

 

 

Image by:
Confluence

Cat 5 (and 6) – A type of cable used to connect devices to a network. Sometimes called “ethernet” cable. Uses twisted pairs of copper cables to transmit data.

 

 

 

 

Image by:
Indiamart

Capacity – A term used to describe how much data a device can store. Usually measured in Gigabytes or Terabytes.

 

 

 

 

Image by:
syhzrlaiman

Casting – The process of converting a variable of one data type into any other data type.

 

 

 

 

Image by:
Slideshare

CD – Compact Disc. A type of optical storage, usually used to hold music or software. Has a typical capacity of 700Mb.

 

 

 

 

Image by
DellEMC

Channel – A specific sub-section of a wireless frequency that is used to transmit data. The available “bandwidth” is split into smaller channels so that wireless devices can switch between them to avoid interference from other local networks.

 

 

 

 

Image by:

 

 

 

 

contentmarketinginstitute

Character – A data type. Specifically, one designed to hold any one single ​letter, number or symbol.

 

 

 

 

Image by:
CodeHS

CIR – Current Instruction Register. Holds the instruction that has just been fetched from RAM and is about to be executed. The instruction will be split in two – the operator (the actual instruction itself such as ADD) and the operand (the data or address the instruction will act on).

 

 

 

 

Image by:
Computerscience

CLI – Command Line Interface. A method of interacting with a computer solely through the use of text in the form of short command words. Often found in server systems or embedded devices. Can perform tasks not possible in a graphical environment, such as scripting repetitive tasks.

Client – Server – A type of network where devices are connected to, and controlled by, one or more servers. Often seen as the “traditional” style of network.

 

 

 

 

Image by:
techterms

Clock Speed – A measurement of the number of cycles per second a CPU can carry out. Measured in GHZ.

 

 

 

 

Image by:
Tes

Cloud Storage – Data that is stored on servers connected to the internet. Usually a rented/subscription service.

 

 

 

 

Image by:
Zdnet

Coaxial – A type of cable used in networking. Usually found on “cable” internet services and TV services.

 

 

 

 

Image by:
Comcast

Compression – the act of reducing the size of a file. (Do not confuse this with making something physically smaller( – for example, if you compress a photograph it doesn’t make the picture appear smaller on the screen, it simply means the amount of 0’s and 1’s which represent that picture are reduced!

 

 

 

 

Image by:
BBC

Computer Misuse ActLegislation (a law) covering the use of computers. There are broadly 3 principles to the act which state that you cannot use a computer to intentionally try and gain unauthorised access to a system, damage data intentionally or use a system for malicious purposes.

 

 

 

 

Image by:
open.edu

Control Bus – A connection between the CPU (specifically the Control Unit) and the rest of the CPU and wider computer system. Used to send control signals to various parts of the CPU and computer to indicate what they should be doing.

 

 

 

 

Image by:
wikipedia

 

 

 

 

Control Unit – Part of the CPU. Responsible for coordinating what the CPU is doing at each part of the FDE cycle. Sends read/write signals to RAM, timing signals to the components of the CPU and control signals to I/O devices.

 

 

 

 

Image by:
Slideshare

CPU – Central Processing Unit – an internal component with a fixed instruction set. Carries out program instructions in a constant cycle called the Fetch-Decode-Execute cycle. CPU speeds are usually measured in Gigahertz (GHz)

 

 

 

 

Image by:
PCWorld

Core – A “single processing unit” inside a CPU. Technically, a core is a CPU! Most modern CPU’s have several cores. The more cores, the more tasks a CPU can carry out in parallel.

 

 

 

 

This is a core and what it inside
image by:
TeachICT

Creative Commons License – A set of rules which describe how a piece of software, code or other content may be freely distributed, changed or used within reason. It forms the backbone of, and enables, the principle of free software. Often used to make code “open source” which means anyone can look, change, use or edit the code as long as they themselves then publish their changes for everyone else to see.

 

 

 

 

Image by:
Wikipeda



D

Data Bus – A connection between the RAM and CPU which enables data and instructions to be transferred between the two components

 

 

 

 

May as well use the same image

Data Protection Act – Legislation (a law) which governs how data must be handled in the UK. There are eight principles which explain how you are allowed to collect data, what you are allowed to do with it, how it should be stored and what steps you should take to secure it.

 

 

 

 

Image by:
CSA

Data Type – Defines what a piece of data is or can be. For example data of the type “Integer” can only be a whole number.

 

 

 

 

Image by:
TestingSortTricks

Decimal A data type. Specifically one designed to hold numbers containing a decimal point.

 

 

 

 

Image by:
tekstenuitleg

Defragmentation – A file system utility which maintains and improves the performance of hard disk drives. This is not necessary on SSD drives as data is physically stored in a different way. Defrag will organise files and data so they are contiguous (not split up) and move as much data as possible to the beginning of the disk, creating large amounts of continuous, empty free space.

Denial of Service (DOS) – Also referred to as DDOS – Distributed Denial of Service. This is a method of taking a website offline by flooding the web server with requests To preform a DDOS you need a botnet but a DOS is from one computer.

 

 

 

 

Image by:
Cloudflare

DNS – Domain Name Server (or Domain Name Services) – A server which has the sole job of translating URL’s (website addresses) into IP addresses. DNS servers are in a hierarchical structure and they are distributed across the Internet to spread the load on them.

 

 

 

 

Image by:
Karen Evans

Driver – A piece of software which is used to control a specific piece of hardware. It will convert generic system calls from the operating system into the specifics needed for an individual device.

 

 

 

 

Image by:
howstuffworks

DVD – A type of optical storage usually used to hold video or software data. Typical capacity of 4.7Gb. Stands for Digital Versatile (or sometimes video) Disc.

 

 

 

 

Image by:
Wikipedia



E

Ethernet – A set of standards which dictate how devices are connected together to form a network and how data will travel between them. It is the standard on which nearly all networks today are built and operate. It is part of the TCP/IP stack.

 

 

 

 

Image by:
Wikipedia

Embedded System – A computer inside a device or appliance. Usually a robust, low power computer with one dedicated task.

 

 

 

 

Image by:
RS online

Encryption – The scrambling of data, using an algorithm in order to make it unreadable/useless to anyone who intercepts or receives it unintentionally. Data is encrypted using a key (a unique string of numbers).

 

 

 

 

Image by:
Tesktalabs

Execute – To carry out an instruction, to do as an instruction tells the CPU. Can also refer to the running of a whole program.

 

 

 

 

Executed commands in a CLI
Image by:
Cnet

 

 

 

 



F

Fetch – Decode – Execute Cycle (FDE) – A cycle carried out by the CPU repeatedly until power is turned off. This involves the fetching of instructions or data from memory, decoding the instruction to work out what it means, followed by the executing (carrying out) of that instruction. 1 Cycle = 1Hz (hertz) and is the quantity by which CPU speed is measured.

 

 

 

 

Image by:
Bitsofbytes

Fibre Optic – A type of cable made from either plastic or glass which is used to transmit data in the form of light. The fastest type of cable, with the highest bandwidth.

 

 

 

 

Optic fiber cable

Firewall – Can be either hardware or software. A firewall is designed to monitor the data packets coming in and going out of a network connection. It will allow or block packets based on a set of rules applied to it. Can also be used as part of internet filtering for a network.

 

 

 

 

Image from:
YouTube

Flash Memory – A kind of memory chip which is non-volatile. Has lots of advantages over other types of storage such as its tiny size, low power consumption and fast read/write speeds.

 

 

 

 

Image by:
Computer Hope

FTP – File Transfer Protocol. A set of rules defining how files can be transferred from client to server or server to client over the internet.

 

 

 

 

Image by:
RTA

Frequency – The wavelength of radio waves used to transmit data using wireless. Measured in GHz, most common “bands” are 2.4GHz and 5GHz

 

 

 

 

Image by:
Dosits

Freedom of Information Act – FOI. Legislation (a law) which gives members of the public the right to request any data held by publicly owned (government) organisations. It cannot be used to request information from private companies!

 

 

 

 

FOI-government

Function – A named block of code which can be called in a program. It will always return (give you back) a value when you call it. 

 

 

 

 

Image by:
Storyblocks



G

Gigabyte – A measurement of storage, equivalent to 1024 Megabytes.

Gigahertz (Ghz) – A measure of CPU speed. 1Ghz = 1 Billion CPU cycles per second. The more Ghz, the more instructions a CPU can carry out per second.

 

 

 

 

Image by:
SlidePlayer

GUI – Graphical User Interface. A method of controlling the computer. usually consists of the WIMP components – Windows, Icons, Menus and a Pointer. The most common computer interface.



H

Hard Disk Drive (HDD) – A method of mass storage in a computer. Hard drives are magnetic storage and use spinning discs called platters to hold data.

 

 

 

 

Image by:
Amazon

Hardware – The physical components of a computer system. To be hardware, you must be able to physically touch/hold it and it must form part of the computer system, for example RAM.

 

 

 

 

Image by:
Towards Data Science

Hertz (Hz) – A measure of CPU speed. 1hz = 1 CPU cycle per second. The more hz, the more instructions a CPU can carry out per second.

 

 

 

 

Image by:
PCWorld

Hosting –  Usually the storage of a website and its associated files on a server. A “host” will provide all the storage and server facilities necessary to run a website. 

 

 

 

 

HostSailor

HTTP-HTTPS– Hyper Text Transfer Protocol. A protocol describing how web pages and associated data should be transmitted through the internet.

 

 

 

 

HTTPS gives the padlock symbol

Hub – A device which connects computers together on a network by simply broadcasting (copying) packets that are sent to every single device connected to the hub. These are no longer used as central points on networks. Note – anything advertised as a “home hub” or “super hub” from an internet provider is NOT actually a hub.

 

 

 

 

Image by:
antkh



I

IMAP – Internet Message Access Protocol. A set of standards designed to manage the sending and receiving of emails and also the management of both online and offline mail boxes. 

 

 

 

 

Image by:
Ask Leo

Input – Data going in to a computer system for the purpose of processing.

Input Device – A piece of hardware used to send data in to a computer system for processing.

 

 

 

 

Image by:
Creatoz

Internet – A world wide network of networks. Not to be confused with the World Wide Web (WWW)

 

 

 

 

Image by:
Worldwide

IP – Internet Protocol. Usually used alongside TCP. A stack which consists of rules that describe how data should be split into packets and how they will travel from one place to another.

IP Address – A 4 byte address, usually written in decimal (e.g. 192.168.1.1) given to a device on a network. This is used to ensure that devices can be identified on a network and traffic can be directed to the right place.

 

 

 

 

Image by:
HowToGeek



J



K

Kilobyte – A measurement of storage, equivalent to 1024 Bytes.

 

 

 

 

Image by:
Pintrest



L

LAN – Local Area Network. A network confined to a small geographic area such as a house, office or school. Usually all equipment is dedicated to or owned by the organisation or person the network belongs to.

 

 

 

 

Image by:
Airgain



M

Magnetic Storage – Any method of storage based on magnetism or magnetic media, such as tape, floppy disks and hard disk drives.

 

 

 

 

Image by:
IGCSE ICT

Malware – Software designed to cause harm, damage data or take data from a machine. Usually in the form of a virus or trojan.

 

 

 

 

Image by:
Ubuntu

MAR – Memory Address Register. Holds the address in memory which is about to be read or have data written to.

MDR – Memory Data Register. Holds the data which has been read from memory or is about to be written to memory.

 

 

 

 

Image by:
teach-ICT

Megabyte – A measurement of storage, equivalent to 1024 Kilobytes.

Megahertz (Mhz) – ​A measure of CPU speed. 1Mhz = 1 Million CPU cycles per second. The more Mhz, the more instructions a CPU can carry out per second.

Memory Card – A type of small, portable, removable storage. Comes in two main types – SD (and micro SD) and CF. Uses flash memory technology.

Memory – An area of temporary storage (volatile) for open, running programs and data.

 

 

 

 

Image by:
Corsair

Mesh Topology – A topology where devices are directly connected to many other devices in the network. There is no central, controlling device.

 

 

 

 

Image by:
Computer Networking

Multitasking – Giving the appearance ​of two or more programs running simultaneously on a system. 

 

 

 

 

Image by:
Natural Instruments



N

Network – Two or more devices connected together for the purpose of sharing (data, resources) and communication.

 

 

 

 

Image by:
Network World.com

NIC – Network Interface Card. This can be either wired or wireless and is simply the piece of hardware which allows a device to connect to a network.

 

 

 

 

Image by:
IndiaMart

Nybble – A collection of 4 bits. Can be used to represent numbers up to 15 or 16 combinations of 0’s and 1’s.

 

 

 

 

Nybbledata.com



O

Operand – Part of a CPU instruction. The operand is either a piece of data (a number) or an address in memory and is the piece of data instruction will work on or with.

Operator (or Op-Code) – A CPU instruction. The operator or Op-Code is simply an instruction which the CPU can carry out such as ADD, JMP, CMP etc. An operator usually needs an Operand to work on or with. For example ADD 5 – ADD is the instruction (operator), 5 is the Operand (data to work with).

 

 

 

 

Image by:
Wikibooks

Operating System – Software which controls all hardware in a system, provides a user interface to allow the system to be used and provides a platform upon which software can be run.

 

 

 

 

Image by:
Proprofs

Optical Storage – A type of storage that uses a laser which is reflected off the surface of a disc to read data. Examples include CD, DVD and Blu-Ray.

Output – Data or information coming out of a computer system – the results of processing.

Output Device – A piece of hardware used to send out or display the results of processing

 

 

 

 

Image by:
Examplesof



P

Packet – Data that has been broken into equal sized chunks to send across a network. A packet will contain some data, a source IP address, a destination IP address, some error correction or checksum data and a time to live counter (max number of hops before being discarded).

 

 

 

 

Image by:
Sisagetkb

Packet Switching – The routing of packets to their destination on a network. Packet switching ensures paths can be shared, networks are used efficiently and related data (or packets) may take many different routes to arrive at a destination.

 

 

 

 

Video from:
Wikipedia

Peer to Peer – P2P – A type of network where all computers work collaboratively to share responsibility for managing the network, sending and receiving data and the sharing of resources such as processing power and storage. Often used in file sharing networks, for example Bit Torrent.

 

 

 

 

Image by:
Tech Differences

Penetration Testing – Where a person or organisation is tasked with finding weaknesses in your IT infrastructure. This can be networks, individual machines, websites and even the people in an organisation. A report is usually produced for the company which explains potential weaknesses.

 

 

 

 

Image by:
Depth Security

Phishing – Tricking users into giving away their user names, passwords or other personal data by impersonating a real organisation. Usually an email is sent to the victim, who then clicks on a link and is taken to a copy of a real website. When the user enters their details these are then stored and can be used maliciously.

 

 

 

 

Image by:
Tech Target

POP – Post Office Protocol. A protocol designed to manage the receiving of emails (notice it has nothing to do with the sending of emails!)

 

 

 

 

Image by:
Difference Between

Processing – The carrying out of instructions, calculations or the manipulation of data in order to produce useful output. 

 

 

 

 

Image by:
IT Concepts

Program Counter – A register in a CPU which holds the address of the NEXT instruction to be fetched from memory.

 

 

 

 

Image by:
[Specified above]

Protocol – A Protocol is a set of rules which establish how communication between two devices should happen. An example would be TCP/IP which controls the sending of packets over a network.

 

 

 

 

Image by:
Computer Concepts

Pseudo Code – A method of writing out algorithms that almost looks like code that would work on a real computer. It is not a specific or real programming language but is very useful when solving problems. OCR love it and can’t decide what it should look like either.

 

 

 

 

Image by:
Yours truly



Q

Q has no IT related words



R

RAM – Random Access Memory. An area of temporary storage in a computer system used to store currently open and running programs and data. Used to speed up system performance compared to fetching program data directly from storage. If RAM is filled then this can lead to much slower performance as the system has to resort to using virtual memory.

 

 

 

 

Image by:
[Specified Above]

Register – a small piece of memory inside a CPU used to hold a single instruction or piece of data. Can also hold the result of processing an instruction in the CPU.

 

 

 

 

Image by:
[Specified Above]

ROM – Read Only Memory. ROM is a type of memory which is non-volatile (the contents is not lost when power is turned off.) ROM is usually used to store the code used to start a computer when it is powered on (BIOS or UEFI).

 

 

 

 

Image by:
Tutorials point

Router – A networking device that connects networks to other networks and routes packets between them. Routers will communicate with each other so they are able to forward packets not only to a destination network, but also closer to their destination – meaning a packet may travel through several routers before it arrives at its destination. Routers are responsible for making the internet work and for connecting LANs to WANs.

 

 

 

 

Image by:
Life wire



S

Secondary Storage – Usually refers to any type of non-volatile storage in a computer system. Examples include Solid State Drives (SSD) and Hard Disk Drives (HDD). Secondary storage is necessary in any system where you need to store large amounts of data, permanently. 

 

 

 

 

Image by:
SHI Blog

Social Engineering – The art of tricking or convincing users to give sensitive information to an attacker. This can be as simple as posing as tech support and simply asking people for their usernames and passwords!

 

 

 

 

Image by:
Kasperspy Labs

SMTP – Simple Mail Transfer Protocol. A set of standards/rules defining how email messages should be routed to their destination mailbox through the internet.

 

 

 

 

Image by:
Knowledge Base

Software – The programs and features that run on a computer system. Software consists of a list of instructions that the CPU processes in order to “run” the program. Without software, a computer system would not do anything.

 

 

 

 

Image by:
Yemen Sound

Solid State Storage – Any kind of storage which uses flash memory chips to hold data. This type of storage is non-volatile, consumes little power, is small and very quick to read and write data to.

 

 

 

 

Yours Truly

SQL – Structured Query Language. This is the language used to manipulate databases. It can be used to add, remove, update and search databases. 

SQL Injection – Most websites are connected to a database. When you fill in a form the data is sent to the database using an SQL query. In some cases it is possible to add SQL code into a web form and it will be executed on the database when you submit the form. By doing so you could potentially damage the database, delete information or even create your own records (like a new admin account!) 

 

 

 

 

Image by:
SitePoint

Star Topology – The most common kind of network topology. All devices are connected (usually by a cable) to a central device (usually a switch). 

 

 

 

 

Image by:
FossBytes

Storage – A non-volatile device which holds programs and data. Can be internal or external. Examples are Hard Drives, SSD’s, Memory Cards, USB Sticks and Optical Storage.

 

 

 

 

Image by:
UIC

Switch – A central point on a LAN or in a star network topology. All devices on a LAN are usually connected to a switch, which then sends packets only to their intended destination. They can also be connected to routers to provide internet connectivity for a network.

 

 

 

 

Image by:
PC World

Systems Software – Software designed to enable hardware and software to work together. Usually provides an interface and is usually in the form of an operating system.

 

 

 

 

Image by:
The crazy Programmer



T

TCP/IP – A suite or “stack” of protocols which describe how data is transmitted and received through the Internet.

 

 

 

 

Image by:
Server Density Blog

Terabyte – A measurement of storage, equivalent to 1024 Gigabytes.

 

 

 

 

Image by:
TechNotification

Topology – The way in which devices are laid out or organised in a network. The topology usually explains how devices are physically connected together.

 

 

 

 

image by:
Study.com

Traffic – A term used to discuss the volume of data being sent through a network. Very high levels of traffic (lots of packets) can result in poorer network performance.

 

 

 

 

Image by:
PC World

Transmission Media – The method by which data is carried from one place to another on a network. This can be different types of wiring, such as ethernet cables, or it can be wireless methods such as WiFi.

 

 

 

 

Image by:
Geeksforgeeks



U

​Utility Software – Software designed to perform a single, specific task, usually in the background. Examples include compression, anti-virus, disk repair, automatic updates and firewalls.

 

 

 

 

Image by:
SQA

USB – Universal Serial Bus. A standard for connecting a multitude of devices and peripherals to computers. Not to be confused with USB Memory Sticks.

USB Memory Stick – A convenient type of removable, portable, mass storage which connects to devices using the USB interface. Uses flash memory technology to store data.

 

 

 

 

Image by:
Reddit
(of course it is)

User Interface – The point at which a user can interact with a computer system. The interface provides a way for you to control a computer system and for it to show you what is happening. There are lots of interfaces, common ones include GUI, CLI, Menu Driven and Voice Driven.

 

 

 

 

Image by:
Web Design Dev

URL – Uniform Resource Locator – Simply put, a website address. 

 

 

 

 

Image by:
Dignited



V

Variable – A piece of storage in a computer program. Variables must have a name and be given a data type. They can only hold one piece of information at any time.

 

 

 

 

Image by:
Computer science notes

Virtual Memory – An area of secondary storage (usually a file stored in secondary storage) which can be used as RAM when the physical memory in a system is full. Allows a computer to open more programs or deal with more data than the physical RAM would normally allow.

Virtual Network or VLAN – When a physical network is divided or organised into several smaller “virtual” networks to help organise, secure and manage traffic on the network.

 

 

 

 

Image by:
Oracle Docs



W

WAN – Wide Area Network. A network where computers are geographically remote from each other, or a network that covers a significant geographic area. WANs must make use of rented/leased telecommunications equipment such as internet connections.

 

 

 

 

Image by:
The Tech Faq

WAP – Wireless Access Point. A piece of hardware on a network that allows devices to transmit and receive data wirelessly.

 

 

 

 

Image by:
ADS Digital

WiFi – Stands for “Wireless Fidelity” but more importantly is a set of standards which dictate how computers are connected together wirelessly and how data should travel between them. See also “Frequency” and “Channels”

 

 

 

 

Image by:
Microsoft

WWW – World Wide Web – A collection of information in the form of web pages that are linked together using hyperlinks. Not to be confused with the Internet!

 

 

 

 

Image by:
Government