MORE OR LESS?

MORE OR LESS?MORE OR LESS?MORE OR LESS?
Home
The Author
Solutions
Topics
Words to Live By
Call to Action

MORE OR LESS?

MORE OR LESS?MORE OR LESS?MORE OR LESS?
Home
The Author
Solutions
Topics
Words to Live By
Call to Action
More
  • Home
  • The Author
  • Solutions
  • Topics
  • Words to Live By
  • Call to Action
  • Home
  • The Author
  • Solutions
  • Topics
  • Words to Live By
  • Call to Action

DEFINITIONS

  • Wi-Fi: Wireless internet connection.
     
  • Bluetooth: Connects things wirelessly, like headphones.
     
  • NFC: What powers contactless payments.
     
  • Hotspot: Using your phone’s data to get another device online.
     
  • App: Software you use for a task.
     
  • App store: Where you download apps.
     
  • Push notification: An alert that pops up on your phone.
     
  • In-app purchase: Buying extras inside an app.
     
  • Location services: Uses GPS to track your position.
     
  • Password manager: Stores and creates strong passwords so you don’t have to remember them.
     
  • 2FA / MFA: A second step when logging in (like a text code or fingerprint). Makes accounts much harder to hack.
     
  • Patch / update: Software fixes you should install quickly to stay secure.
     
  • Phishing: Fake emails or messages trying to trick you into handing over money or passwords.
     
  • Social engineering: Scams that target you directly (like a fake call from “IT support”).
     
  • Router: The box that connects your home to the internet.
     
  • IP address: The online “address” of your device.
     
  • DNS: Like the internet’s phone book – it turns web names into numbers.
     
  • Bandwidth: How much data your connection can handle at once.
     
  • Latency / ping: The delay – lower is better for video calls and gaming.
     
  • 4G / 5G: Mobile internet speeds. 5G is faster.
     
  • Cloud: Storing and using services online instead of on your device.
     
  • Streaming: Watching or listening without downloading the whole file first.
     
  • VoIP: Calls made over the internet (Zoom, Teams).
     
  • Cookie: Small file a website saves in your browser, often for tracking or logins.
     
  • Targeted advertising: Ads chosen based on your browsing habits.
     
  • Digital footprint: The trail of everything you do online.
     
  • Metadata: Information about your activity (like who you messaged and when) even if the actual content is hidden.
     
  • End-to-End Encryption (E2EE): Only you and the person you’re messaging can read the conversation. Not even the app provider can.
     
  • Encryption: Scrambles your information so outsiders can’t read it.
     
  • HTTPS: Secure websites (padlock icon in the browser).
     
  • VPN: Makes your internet connection private and hides your location.
     
  • Zero-knowledge design: Even the service provider cannot see your data.
     
  • Backup: A second copy of your data, kept safe in case you lose the original.
     
  • Incremental backup: Only saves the new changes since the last backup.
     
  • Compression: Shrinks file size (sometimes with quality loss).
     
  • Data breach: When personal information is leaked or stolen.
     
  • CPU: The main processor (the device’s “brain”).
     
  • GPU: Processor for graphics and video.
     
  • RAM: Short-term memory that apps use while running.
     
  • SSD / HDD: Types of storage – SSDs are faster, HDDs are older and slower.
     
  • Motherboard: The main board all parts connect to.
     
  • USB-C: A newer, reversible charging and data cable.
     
  • HDMI: Cable for connecting screens and TVs.
     
  • OLED / LCD: Types of screens – OLED usually looks sharper.
     
  • Resolution: How detailed a screen image is (e.g. 4K).
     
  • Refresh rate: How smooth the screen looks (higher feels smoother).
     
  • Battery cycle: One full charge and discharge – batteries wear out after many cycles.
     
  • Wireless charging: Charging without plugging in a cable.
     
  • Operating System (OS): The main software that runs your device (Windows, iOS, Android, etc.).
     
  • Driver: Lets the OS talk to hardware like printers.
     
  • UI / UX: What you see on-screen (UI) and how easy it feels to use (UX).
     
  • Dark mode: Light text on a dark background.
     
  • Open source: Free code anyone can look at and change.
     
  • Proprietary: Closed code owned by a company.
     
  • Sideloading: Installing apps from outside the official store (riskier).
     
  • Jailbreaking / rooting: Unlocking a device’s restrictions – usually risky.
     
  • Dark pattern: Tricks in app design that push you into bad choices (like making “unsubscribe” hard to find).
     
  • Algorithm: Automated rules that decide what you see online.
     
  • Moderator: Person or system that polices online content.
     
  • Terms of Service (ToS): The rules you agree to when using a site or app.
     
  • Freemium: Basic features free, extras cost money.
     
  • AI (Artificial Intelligence): Computers doing tasks that usually need human intelligence.
     
  • Machine Learning: AI that improves by learning from data.
     
  • Generative AI: AI that creates text, images or sound (like ChatGPT).
     
  • AR / VR: Augmented and virtual reality (e.g., AR overlays on your phone, VR headsets).
     
  • Metaverse: A virtual world concept combining AR/VR.
     
  • Blockchain: A digital ledger for tracking transactions.
     
  • Cryptocurrency: Digital money like Bitcoin.
     
  • NFT: A unique digital “certificate” often tied to art.
     
  • Green IT: Technology designed to reduce environmental impact.
     
  • ePrivacy Directive (Cookie Law): EU rule requiring consent for non-essential cookies.
     
  • GDPR: Law that protects your data in the UK/EU.
     
  • Right to be Forgotten: GDPR provision allowing individuals to request deletion of personal data.
     
  • ICO (Information Commissioner’s Office): UK authority enforcing data protection law.
     
  • Copyright: Legal right granting creators control over copying and distribution.
     
  • Fair dealing (UK): Limited legal exceptions to copyright for criticism, news, study.
     
  • DMCA (US): American copyright law with notice-and-takedown for online infringements.
     
  • Safe Harbour / intermediary liability: Shield for platforms that promptly remove illegal user content once notified.
     
  • Net neutrality: Principle that ISPs must treat all lawful traffic equally.
     
  • Section 230 (US): Protects platforms from liability for most user-generated content.
     
  • Digital Services Act (DSA): EU legislation setting duties for online platforms to tackle illegal content.
     
  • Digital Markets Act (DMA): EU rules curbing gatekeeper power of big tech firms.
     
  • Investigatory Powers Act (IPA, “Snooper’s Charter”): UK law expanding surveillance and data-retention powers.
     

Case Study: Bits and Bytes


  • Bit: The smallest unit of computer information, like a light switch that can only be off (0) or on (1).
     
  • Byte (B): 8 bits, enough for one letter, number or symbol.
     
  • Kilobyte (KB, ~1,000 bytes): A short email or paragraph of text.
     
  • Megabyte (MB, ~1,000 KB): A selfie or a short song.
     
  • Gigabyte (GB, ~1,000 MB): A feature-length film, about 200 songs, or several hundred photos.
     
  • Terabyte (TB, ~1,000 GB): Roughly 1,000 films, 200,000 songs, or years of phone photos.
     
  • Petabyte (PB): A vast data centre or all the books in a national library.
     
  • Exabyte (EB): Data handled by the entire internet in a single day.
     
  • Zettabyte (ZB): The world’s internet traffic in a year.
     
  • Yottabyte (YB): So large it could hold all the data ever created many times over.

Copyright © 2025 - All Rights Reserved.

  • Privacy Policy