Being a whizz when it comes to technology is not everybody’s calling, that much is for certain. However, that’s not say that technology isn’t there for everybody to use, because it is. You don’t have to be a computer geek and know all of the technical technological terms to be able to use computers; but, again, that’s not to say you shouldn’t try to learn more of them and more about them if you want to. Below are a number of tech terms you may have come across before, but not really understood, explained in ways that should make everything seem a bit clearer.


In relation to modern day computer systems, configuration refers to the technical specifications of a computer. These tech specs include a plethora of different bits and bobs but are generally made up of the RAM, the processor, the hard drive and the video card. Specifically, configuration is the arrangement of all of these functional units in accordance with the nature of the work they do/produce. Without configuration, computers simply would not work.


This is the highly important process of converting data into an unrecognisable form. Basically, encryption is probably the most important aspect of keeping yourself safe when using online technologies, especially those that work on shared networks such as that of the Wi-Fi as it makes sensitive data only accessible to those that are authorised to see it. This means that, say if you were to send a photograph over a Wi-Fi connection, encryption would instantly get to work in making sure that the photo is disguised and hidden to everybody else in the world except you and the person you sent it to.


Similarly, firewalls also protect when dealing with outside connections. This wall establishes a blockade between an internal network, such as your own, and an outside one, such as the Internet. The firewall is a like a glorified security guard: it allows certain access to the resources of a network based on a set of rules laid out in the firewall policy. This is why it is important to always read the policy of a firewall beforehand so that you understand the firewall’s rules and know exactly what is being allowed access to your network


This is short for ‘malicious software’, and that is not an understatement. It is software that is created only to inflict damage on a computer system; a virus is a type of malware, and you’re probably aware of the damage they can do: they can wreak on your computer by deleting files. Another type of malware is spyware: this can gather all sorts of private information from your system, including the web pages you have visited and even personal information, without you even knowing it is happening or even there in the first place. Because of these horrible little pieces of software, it is pivotal to ensure that your system is protected by anti-virus software, the best of which can be found here.


Computer programming, which is more often than not just shortened to programming, is the act of creating a software program. It makes sense when you put it like that: so maybe you should know what a software program is before you can learn about the process of their creation. A software program is basically just the name for everything you use on your technological device every day: the web browser, your word processor, your system utilities, etc. So, programming is just the creation of these programmes or applications, and is done so through writing code and coding. If you’re new to the world of programming, then an Integrated Development Environment is something that you should seek to optimise; the IDEs on this list are all examples of this type of software suite. They act as text editors, debuggers, and compilers and offer up developers the basic tools needed for the programming and coding of software.

Wired Equivalent Privacy

WEP is the main security protocol for Wi-Fi connections. Due to nature of all the wireless-ness that takes place over Wi-Fi connections and networks, it is easy for any would-be hackers or eavesdroppers to be able to, well, eavesdrop on a transmission. Without a sufficient safety protocol in place, it would be very easy for all those horrible hackers out there to be able to intercept your data when you’re connected to a Wi-Fi network; this is where WEP comes in. The clue is in the name: ‘wired equivalent’ does just what says on the tin: it is security that is equivalent to that that is found in wired connections, such as Ethernet connections. Generally you will be able to tell if you are using a Wi-Fi that is WEP’d by way of the fact that you will be asked to enter a password upon trying to access it.


This is a free content management system that is used to create websites, particularly blogs. It allows for the user to easily design and publish their websites; even those with no experience in web development can use and optimise WordPress. It’s systems allow for an easy way for the user to track aspects such as visitors to their site, the success of their posts and comments made about them and the site.

Perhaps, once you get to grips with the terms above and the whole host of other tech terms out there and know everything that it is possible to know about them, you’ll be able to answer questions or fix problems without having to seek advice from search engines beforehand; poor Google, it may suffer a further drop in search. The technological advances of today have offered up a whole new world wide web. of things to be explored, learned about and experimented with, so if you’re looking for a new challenge in life why not educate yourself in them all and become the computer whizz you’ve always dreamed of becoming? If this isn’t your dream, well it can never hurt to have your finger on the pulse of all the advances of the modern world, can it?

About The Author

General communicator. Travel specialist. Writer. Infuriatingly humble reader.

Related Posts