A

ACPI
Stands for "Advanced Configuration and Power Interface" – controls automatic configuration of the PC and power management.

Backwards compatible
Means that a program or component also works with earlier versions of itself.

Ad-Ware
Software that is funded by displaying advertisements (ads) to the user.

AMD
"Advanced Micro Devices" – the second-largest manufacturer of computer processors after Intel, and also of graphics chips since its merger with ATI.

Anti-virus program
A program that protects computers from malware (viruses, trojans, worms, ...). Should be installed on every PC!

Two-factor authentication (2FA)
An extra security step when logging into online services. In addition to your password, a second proof of identity is required – usually a one-time code sent by SMS or app. Even if someone knows your password, they can't get into your account without this code. Highly recommended for email, banking and social media!

AVI
Short for "Audio Video Interleave" – a playback format for video files.

B

Backup
The process of copying individual files or entire hard drives so that a copy exists in the event of data loss.

Bluetooth
A short-range wireless standard for transferring data between devices over short distances (up to approx. 10 metres). Used for headphones, mice, keyboards, speakers and connecting phones to PCs. Requires no WiFi and uses very little power.

BIOS
The "Basic Input Output System" controls the fundamental functions of the motherboard, such as hard drive sizes and settings, processor clock speed, memory timing and much more.

Blue Screen (BSOD)
When a program error or hardware failure occurs, the system crashes and displays an error message on a blue background – the infamous "Blue Screen of Death".

Boot sector
The first sector of a hard drive, where important data needed to start (boot) the system is stored.

Browser
The program you are using right now to view this page. It is used to access and display websites. The most common ones are: Chrome, Firefox, Edge, Opera and Safari.

Bug
A program error. The term dates back to the early days of computing, when computers filled entire rooms. On one occasion, technical problems were traced to actual insects ("bugs") that had settled between the warm components and caused a short circuit.

C

CPU
Stands for "Central Processing Unit" – the main processor in a computer. It is the central computing and control unit for all calculations.

CAPTCHA
Stands for "Completely Automated Public Turing test to tell Computers and Humans Apart". Used on websites to distinguish human users from automated programs. The goal is to reduce spam, since spam bots cannot read the deliberately distorted CAPTCHA characters – but a human can.

Cookie
Websites store data such as passwords or preferences in so-called cookies on your PC, so you don't have to re-enter your password every visit. Browsing habits can also be tracked this way. Cookies can be disabled in browser settings but are always enabled by default.

Cloud
Storing and managing data on servers on the internet rather than on your own hard drive. Well-known examples: Google Drive, OneDrive, iCloud. Advantage: data is accessible from anywhere and any device. Disadvantage: you depend on an internet connection and your data is stored on someone else's servers.

D

DisplayPort
A modern connector for digital transmission of audio and video between a PC and monitor. Supports very high resolutions (4K, 8K) and high refresh rates. Has replaced DVI and increasingly HDMI as the standard monitor connection.

DPI
"Dots per Inch" – the unit of measurement for resolution when printing and scanning. The more DPI, the more detail in the printout or scan.

E

Ebook
A digital "book" that can be read on computers or dedicated devices such as the Kindle.

Error 404
Appears when a requested webpage cannot be found. Either the address entered is wrong, the page has been moved, or the server hosting the page has no internet connection.

F

FAQ
Stands for "Frequently Asked Questions". A collection of common questions and answers, especially in internet forums – worth reading before asking the same question again!

Phishing
An attempt to obtain personal data such as passwords or banking details through fake emails or websites. Classic example: an email apparently from your bank asking you to confirm your login details. Never click such links – banks and reputable companies never ask for passwords by email!

Hard drive (HDD)
All data is stored magnetically on spinning discs with read heads, similar to a record player. Because of the moving parts, hard drives are sensitive to strong shocks – another reason to handle laptops with care.

Firewall
A security barrier that blocks unauthorised access to your PC from the internet. It monitors all incoming and outgoing connections. When installing some programs, the firewall asks whether to allow the program internet access – a browser should be allowed, a game probably doesn't need it.

Firmware
Programs that control basic device functions (e.g. in drives). Unlike software, firmware is stored in the device's chips, but can be updated when necessary.

Flat rate
A billing model for telecoms charges. Instead of paying per unit of use, you pay a fixed price regardless of consumption.

G

GIF
An image format that, unlike JPG, supports transparent backgrounds and even animations.

Gigabyte
A unit of measurement for storage capacity. 1 gigabyte = 1,024 megabytes = 1,048,576 kilobytes.

GPU
The "Graphics Processing Unit" is the counterpart to the CPU – it handles all image calculations. High-end graphics cards even have two GPUs.

Graphics card
A component responsible for displaying all graphics on the monitor. Available either integrated on the motherboard or as a separate expansion card.

H

Hardware
The physical electronic and mechanical components of a computer and its peripherals. Hardware can be touched, unlike software.

RAM (Random Access Memory)
Small circuit boards fitted with memory chips, slotted into the motherboard. Every running program claims part of the RAM. If too little RAM is installed, the system slows down when multiple programs are open.

HDMI
"High Definition Multimedia Interface" – transmits both video and audio digitally in one cable. Widely used in consumer electronics (game consoles, TVs, etc.).

Hotfix
A rapid update that quickly closes a security vulnerability in software.

I

Intel
The world's largest processor manufacturer alongside AMD.

IP address
Every computer on the internet must have a unique IP address, just like every house has a postal address. Example: 161.195.203.156

IPv4
"Internet Protocol Version 4" – the foundation of today's internet. Uses 32-bit addressing, allowing just over 4.3 billion unique addresses. As the number of connected devices keeps growing, these addresses are running out, which is why IPv6 was developed.

IPv6
As above, but using 128-bit addressing – allowing 340 sextillion addresses. That should last a while!

J

JPG (JPEG)
An image format with various compression methods, ranging from lossy to lossless compression.

Junk mail
Unwanted advertising email that nobody asked for (also called spam).

K

Keylogger
Malware that silently records every keystroke and sends the data to its creator. The goal: stealing passwords and banking details.

Compatibility
The ability of hardware components or software to work together without errors. In hardware, it means devices communicate correctly; in software, it means programs can be swapped without loss of function.

Compression
A method for reducing file size while generally preserving the information content. Crucial for the internet as smaller files transfer faster. Examples: MP3, JPG, AVI, MPEG.

L

LAN
"Local Area Network" – connecting several computers via cables within a limited area (e.g. an office). Not the same as the internet. The opposite is WAN (Wide Area Network).

Link
A connection (hyperlink) from one webpage to another.

LightScribe
A technology in some DVD burners that allows specially coated discs to be labelled or decorated using the laser.

Linux
An alternative operating system to Windows. Based on UNIX with open-source code, meaning anyone can develop their own version from it.

M

Macro viruses
A special type of virus hidden inside Microsoft Word or Excel documents. When the infected document is opened, they activate and execute their malicious code, potentially infecting other documents.

Mainboard (also called Motherboard)
The main circuit board in a computer, into which components such as the graphics card, CPU and memory are plugged.

MBR
The "Master Boot Record" sits at the start of a storage device and contains the partition information needed to boot the system.

Modem
Portmanteau of Modulator and Demodulator. A device that converts digital computer signals into tones for transmission over analogue telephone lines, and vice versa.

MP3
An audio compression format developed by the German Fraunhofer Institute. Inaudible parts of music are removed to reduce file size – a standard CD can hold up to 15 hours of MP3 audio.

N

Power supply unit (PSU)
Converts mains voltage (230V AC) into the low DC voltages a computer needs (up to 12V).

Network
A system in which multiple computers share data and devices (e.g. a printer). The minimum hardware required: cables, network cards and a router to direct traffic.

NTFS
"New Technology File System" – the standard Windows file system, offering access control for files and journaling for data integrity.

O

OCR
"Optical Character Recognition" – software used when scanning documents that recognises letters and saves them as editable text. Not always 100% accurate, so always proofread against the original.

OEM
"Original Equipment Manufacturer" – a company that produces products under its own name that were designed or made by another manufacturer. OEM software versions are usually identical to retail versions but cost significantly less.

OS
Short for "Operating System" – e.g. Windows, Linux, macOS, UNIX.

P

Partitioning
Dividing a hard drive into separate sections (partitions), each with its own drive letter. Example: Partition 1 = Drive C: (Windows and programs only), Partition 2 = Drive D: (photos and music).

Password manager
A program that stores all your passwords securely encrypted. You only need to remember one master password. The manager also generates strong random passwords for new accounts. Recommended examples: KeePass (free), Bitwarden (free), 1Password. Highly recommended!

Pixel
A portmanteau of "picture" and "element". The smallest distinguishable unit in an image grid – one picture dot.

Plug & Play (PnP)
A technology that allows hardware to be connected and used immediately without manual configuration – just plug it in and play.

Q

QR code
A two-dimensional barcode that can be scanned with a smartphone camera, usually linking to a website. Found on posters, business cards, packaging and menus. Caution: criminals also use fake QR codes to redirect to fraudulent websites!

R

RAR
A compression format for files of all kinds (similar to ZIP).

Ransomware
A particularly dangerous type of malware that encrypts all files on a PC and demands a ransom (usually in Bitcoin) for the decryption key. Once infected, data is often irretrievably lost without the attackers' key. Best prevention: regular backups to an external drive that is not permanently connected!

Registry
The central database in Microsoft Windows where all hardware and software configuration information is stored.

RGB
Short for "Red", "Green", "Blue". A colour system that can produce up to 16.7 million colours from these three primaries. Used in monitors and scanners (as opposed to CMYK used in printers).

Router
A networking device that directs data traffic between computers and the internet. It reads the IP address of each data packet and finds the best available route to the destination.

Rootkit
The most dangerous hacker tool – a collection of programs able to hide themselves by operating at operating system level rather than user level, bypassing antivirus software. Best defence: keep all software updated, use a virus scanner, never open unknown email attachments.

S

Server
A computer that provides data in a network for other computers (clients) to access. Example: your browser (client) requests a page; the server delivers the result.

Shareware
Software available free for a trial period. After the trial, the user must register and pay (usually a small fee) to continue using it.

S.M.A.R.T.
"Self Monitoring Analysis and Reporting Technology" – hard drives monitor themselves and warn of impending failure. If you see "S.M.A.R.T. Status: Bad – Backup and Replace", do it immediately!

SMTP
"Simple Mail Transfer Protocol" – used to send emails between internet mail servers.

Spyware
Programs that spy on your browsing behaviour and passwords and send the data to their creators. Often bundled with free software – not everything that's free is safe!

Streaming
Playing multimedia content in real time as it downloads, without saving it to a file first. Used by services like YouTube, Netflix and Spotify.

SSD (Solid State Drive)
A modern storage device that uses flash memory chips instead of spinning discs. No moving parts, shock-resistant, much faster than an HDD and silent. Now standard in all modern laptops and PCs. Replacing an old hard drive with an SSD is often the cheapest way to dramatically speed up an ageing computer!

T

TCP/IP
The combination of the two key internet protocols. TCP (Transmission Control Protocol) breaks files into packets; IP (Internet Protocol) sends each packet individually to the destination, where TCP reassembles them into the original file.

TFT
"Thin Film Transistor" – the basic building block of active LCD screens. Each pixel has its own tiny transistor (four for colour pixels), delivering high contrast, excellent readability and vivid colours.

Thumbnail
A very small preview version of an image. Clicking the thumbnail displays it at full size.

Driver
A "translator" program that allows a hardware component to communicate with the operating system. Without the correct driver, most hardware won't work.

Trojan
A type of malware disguised as a harmless file. Once on your PC, it spies on important data and often opens a "backdoor" through which it downloads further malware – potentially hundreds of viruses, worms and more.

U

UNIX
An operating system developed by Bell Laboratories and AT&T in 1969. A multi-user, multi-tasking system widely used on internet servers due to its stability. The ancestor of many modern systems including Linux, macOS, Solaris and others.

Unsubscribe
To cancel a newsletter or mailing list subscription, usually by sending an email containing the word "unsubscribe" or clicking an unsubscribe link.

USB
"Universal Serial Bus" – the standard connector for peripherals such as mice, printers and memory sticks. Types: USB 2.0 (older, slower), USB 3.0/3.1 (blue port, faster), and modern USB-C (oval connector, reversible, carries data, power and video).

VPN (Virtual Private Network)
An encrypted internet connection that hides your real IP address and protects your data. Useful for safe browsing on public WiFi (cafés, hotels, airports) or accessing content not available in your country. Known providers: NordVPN, ExpressVPN, or the free ProtonVPN.

V

Virus
A maliciously written program that causes damage on an infected computer – destroying software or even wiping the entire hard drive. Viruses spread via USB sticks, downloads, email attachments and more. Some can disguise themselves from antivirus scanners; others spread by emailing themselves to contacts. Related types: Trojans, macro viruses, worms, rootkits. Always scan unknown files with antivirus software before opening.

W

WAN
"Wide Area Network" – a network spanning large distances, up to worldwide. The internet is the largest WAN. The opposite is LAN (Local Area Network).

Windows 11
Microsoft's current operating system (as of 2025). Features a modernised interface with a centred Start menu. Important: Windows 10 will no longer receive security updates from October 2025 – upgrading to Windows 11 or buying a new PC is strongly recommended. Note: not all older PCs support Windows 11 (TPM 2.0 chip required).

WiFi (Wireless LAN)
The same principle as a wired LAN, but using radio waves instead of cables.

WPA / WPA2 / WPA3
Encryption standards for WiFi networks. WPA3 is the most secure current standard. The older WEP is considered insecure and should no longer be used. At minimum, WPA2 should be enabled in your router settings.

Worm
A type of malware that can copy and spread itself via email and networks without any user action.