The Definitive IT Glossary for Businesses

The Definitive IT Glossary for Business

When you live in the world of IT, it’s easy to forget that the acronyms we use every day look like alphabet soup to everyone else. To help demystify the tech jargon, we’ve compiled this definitive glossary. Whether you are troubleshooting a network issue or looking to upgrade your cybersecurity, understanding this language is your first step to making empowered technology decisions.

A

  • ACK (Acknowledgment): A signal used in communication protocols (like TCP) to confirm the successful receipt of data packets. It ensures your data arrived safely at its destination.
  • ACL (Access Control List): A set of rules that specifies which users or system processes are granted access to network objects, applications, or files, as well as what operations they are allowed to perform.
  • ADSL (Asymmetric Digital Subscriber Line): A type of broadband communications technology used to connect to the Internet over standard telephone lines, typically offering faster download speeds than upload speeds.
  • AES (Advanced Encryption Standard): A highly secure, globally accepted standard for encrypting electronic data. It is widely used by businesses, banks, and governments to keep sensitive information safe from cybercriminals.
  • API (Application Programming Interface): A set of rules that allows different software applications to communicate with each other. It’s what allows your CRM to “talk” to your email marketing software seamlessly.
  • ARP (Address Resolution Protocol): A telecommunication protocol used to map a dynamic network layer address (like an IP address) to a physical machine address (like a MAC address).
  • ATM (Asynchronous Transfer Mode): A telecommunication standard used for transmitting multiple types of traffic (voice, video, and data) at high speeds over a single network.

B

  • BDR (Backup and Disaster Recovery): A combination of data backup and disaster recovery solutions designed to ensure a business can quickly restore its data and resume operations after a cyberattack, hardware failure, or natural disaster.
  • BGP (Border Gateway Protocol): The routing protocol that makes the internet work. It manages how packets are routed across the internet through the exchange of routing and reachability information among autonomous systems.
  • BIOS (Basic Input/Output System): The essential firmware embedded in a computer’s motherboard. It initializes hardware components when you turn your computer on and ensures the operating system loads correctly.
  • BSS (Basic Service Set): The fundamental building block of a wireless network (WLAN), consisting of a single access point and the wireless devices connected to it.
  • BYOD (Bring Your Own Device): A business policy that allows employees to use their personal smartphones, tablets, or laptops for work purposes, requiring strict security management.

C

  • CAT (Category): Used to denote types of Ethernet cables for wired networks. Common examples include Category 5e (CAT 5e) or Category 6 (CAT 6), which indicate the cable’s speed and bandwidth capabilities.
  • CHAP (Challenge-Handshake Authentication Protocol): A network authentication protocol that uses a challenge-response mechanism to verify identity without transmitting passwords in plaintext.
  • CIDR (Classless Inter-Domain Routing): A method of allocating IP addresses and routing Internet Protocol packets more efficiently than the older class-based system.
  • CIR (Committed Information Rate): The guaranteed minimum bandwidth provided by your internet service provider (ISP) under normal operating conditions.
  • CLI (Command-Line Interface): A text-based user interface used to view and manage computer files by typing commands directly, rather than using a mouse to click icons.
  • CPE (Customer Premises Equipment): Telecommunications hardware—like modems, routers, or VoIP phones—located directly at a customer’s physical office rather than at the provider’s data center.
  • CPU (Central Processing Unit): Often called the “brain” of the computer, it handles the instructions you give the machine and performs the calculations needed to run applications.
  • CRM (Customer Relationship Management): Software systems used to manage a company’s interactions with current and potential customers, organizing sales, marketing, and customer service data.

D

  • DDR (Double Data Rate): A type of fast computer memory (SDRAM) that transfers data twice per clock cycle, improving overall system speed.
  • DDoS (Distributed Denial of Service): A type of malicious cyberattack where multiple compromised systems overload a target (like a website or server) with traffic, causing it to crash or become unavailable.
  • DNS (Domain Name System): The “phonebook” of the internet. It translates human-readable domain names (like www.google.com) into the IP addresses that computers use to identify each other.
  • DRAM (Dynamic Random Access Memory): A common type of computer memory that stores each bit of data in a separate capacitor within an integrated circuit.

E

  • ECC (Error-Correcting Code): A specialized memory technology that detects and corrects single-bit memory errors to enhance data integrity and prevent system crashes in critical servers.
  • ERP (Enterprise Resource Planning): Comprehensive business management software that integrates all facets of an operation, including planning, development, manufacturing, sales, and human resources.

F

  • FDD (Floppy Disk Drive): A legacy computer disk drive that enables a user to save data to removable magnetic diskettes (largely replaced by USBs and cloud storage).
  • FPS (Frames Per Second): A measurement of how many images a system displays in one second. Higher FPS results in smoother video, gaming, and graphic performance.
  • FTP (File Transfer Protocol): A standard network protocol used to transfer files between a client and server. (Note: FTP itself is not encrypted; secure alternatives include SFTP or FTPS.)

G

  • GB (Gigabyte): A standard unit of digital storage capacity equal to approximately one billion bytes.
  • GDI (Graphics Device Interface): A core component of Microsoft Windows used for rendering 2D graphics and managing visual output on monitors and printers.
  • GUI (Graphical User Interface): A visual way of interacting with a computer using items such as windows, icons, and menus, navigated via a mouse (as opposed to a text-based CLI).

H

  • HDLC (High-Level Data Link Control): A bit-oriented protocol used for reliable, error-free communication over point-to-point network links.
  • HTTP / HTTPS (Hypertext Transfer Protocol / Secure): The foundational protocol for transferring data over the web. The “S” in HTTPS indicates that the connection is encrypted for security, protecting sensitive data like passwords and credit card numbers.

I

  • IaaS (Infrastructure as a Service): A form of cloud computing that provides virtualized computing resources (servers, networking, storage) over the internet, allowing businesses to scale without buying physical hardware.
  • ICMP (Internet Control Message Protocol): A network layer protocol used by devices to diagnose network communication issues and report errors, such as a requested service being unavailable.
  • IP (Internet Protocol): The set of rules responsible for addressing and routing data packets across the internet so they reach the correct destination (supporting both IPv4 and IPv6).
  • ISP (Internet Service Provider): The company that provides your business or home with access to the internet.
  • IT (Information Technology): The broad discipline concerning all aspects of managing, processing, protecting, and storing digital information.

L

  • LAN (Local Area Network): A localized computer network that interconnects computers and devices within a limited area, such as a single office building or home.

M

  • MAC (Media Access Control): A unique physical identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment.
  • MB (Megabyte): A unit of digital information storage equal to approximately one million bytes.
  • MDM (Mobile Device Management): Security software used by IT departments to monitor, manage, and secure employees’ mobile devices (smartphones, tablets, laptops) that are deployed across mobile operators, service providers, and enterprises.
  • MFA / 2FA (Multi-Factor / Two-Factor Authentication): A crucial security enhancement that requires a user to present two or more pieces of evidence (like a password and a text code) to successfully log in to an account.
  • MSP (Managed Service Provider): An outsourced IT company (like CMIT Solutions) that assumes ongoing responsibility for 24/7 monitoring, managing, and problem resolution for a business’s IT systems.

N

  • NAC (Network Access Control): A robust security solution that enforces policies to regulate access to network resources, ensuring that only authorized, secure, and compliant devices can connect to your business network.
  • NIC (Network Interface Card): A computer hardware component (either wired or wireless) that connects a computer directly to a computer network.

O

  • OS (Operating System): The primary software that manages all the hardware and other software on a computer. Common examples include Microsoft Windows, macOS, and Linux.

P

  • PaaS (Platform as a Service): A cloud computing model that provides a complete framework for developers to build, test, and deploy custom software applications without worrying about underlying infrastructure.
  • PPP (Point-to-Point Protocol): A data link protocol used to establish a direct, secure connection between two network nodes.

R

  • RAM (Random Access Memory): The short-term memory of a computer. It temporarily stores the data your computer is actively using so it can be accessed almost instantly.
  • RDP (Remote Desktop Protocol): A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection securely.
  • ROI (Return on Investment): A performance measure used to evaluate the financial efficiency or profitability of an IT investment relative to its cost.

S

  • SaaS (Software as a Service): A software distribution model where applications are hosted by a vendor in the cloud and made available to customers over the internet (e.g., Microsoft 365, Google Workspace, Salesforce).
  • SFTP (Secure File Transfer Protocol): An advanced version of FTP that provides secure file transfer over an encrypted SSH connection, protecting sensitive data during transmission.
  • SLA (Service Level Agreement): A documented contract between a service provider and a client that specifies the exact level of service expected, including metrics like guaranteed uptime, response times, and problem resolution.
  • SSH (Secure Shell): A cryptographic network protocol used by network administrators for secure remote access, system management, and encrypted communication over an unsecured network.
  • SSO (Single Sign-On): An authentication process that allows a user to access multiple applications with one set of login credentials, improving both convenience and security.

T

  • TB (Terabyte): A massive measure of computer storage capacity equal to approximately one trillion bytes, or 1,000 Gigabytes.
  • TCP/IP (Transmission Control Protocol / Internet Protocol): The foundational suite of communication protocols used to interconnect network devices on the internet.

U

  • UPS (Uninterruptible Power Supply): A battery backup system that provides emergency power to critical IT equipment when the main power source fails, preventing data loss and hardware damage.
  • URL (Uniform Resource Locator): The standard address format used to identify a web page or resource on the internet (e.g., https://www.cmittc.com).

V

  • VDC (Virtual Data Center): A pool of cloud-based infrastructure resources—including compute, storage, and networking—that organizations can use to build and manage scalable IT environments without physical hardware.
  • VLAN (Virtual Local Area Network): The logical segmentation of a physical network into isolated, separate networks. This improves network performance and security by keeping different departments’ data isolated.
  • VoIP (Voice over Internet Protocol): A technology that allows you to make and receive telephone calls over a broadband internet connection instead of a traditional analog phone line.
  • VPN (Virtual Private Network): A technology that creates a secure, encrypted connection (a “tunnel”) over a less secure network like the internet. It is essential for remote workers to securely access company data.

W

  • WAN (Wide Area Network): A large computer network that connects groups of computers over large geographical distances (e.g., connecting branch offices in different cities).
  • WLAN (Wireless Local Area Network): A wireless computer network that links two or more devices using high-frequency radio waves instead of cables.