28 Essential IT Terms & Tech Jargon You Should Know

28 tech terms blog

Let’s face it, the IT world is confusing. There are a lot of puzzle pieces coming together for the overall big picture and for managers and owners of other skill sets, learning and knowing IT just isn’t feasible.

To help, we’ve compiled a list of Top IT Tech Terms for every business owner that is essentially, CLEAR and SIMPLE. Not that we don’t think you couldn’t handle more! It’s just that’s what we’re here for!


An Application, which is usually a piece of software that performs a specific function (e.g. accounting software) If the app connects to the internet, or is run through a web browser, it is sometimes known as a Web App.


An application that enables access to the internet or world wide web. The most popular browser is Google Chrome at 66%, followed by Microsofts internet explorer at 11% and Mozilla Firefox at 10%.

BYOD (Bring your own device)

A policy where an employee can decide to use their own private technology for business use. Typically a phone or computer, but also can include tablets. It is important to have regular updates applied to BYOD’s as virus and hacking threats are common without updates.

Carrier Services

The term ‘carrier’ is short for ‘wireless carrier’. Other terms used that refer to the same thing include mobile network operator, cellular company, and wireless service provider.

Cloud Hosting

The ability to store data and applications on virtual servers outside the physical office locations. This is typically done through third-party companies that provide the service.

CMS (Content management system)

Cloud and web-based technologies that makes it easy to store, share and manage digital information within an organization.

CRM (Customer relationship management)

An application that allows businesses to manage business relationships and the data and information associated with them. Used to store customer and prospect contact information, accounts, leads, and sales opportunities in one central location usually in the cloud for immediate accessibility.


A small piece of information you may be asked to accept when connecting to certain servers via a web browser. It is used throughout your session as a means of identifying you. A cookie is specific to and sent only to the server that generated it.

Data Breach

An unfortunate event where a company’s private information (or their customer information) is stolen. Usually done through hacking or phishing scams. Common data breach exposures include personal information, such as credit card numbers, Social Security numbers and healthcare histories, as well as corporate information, such as customer lists, manufacturing processes and software source code.

DNS (Domain Name Service)

Domain Name System; a service for accessing a networked computer by name rather than by numerical, (IP) address.


The coding and scrambling of data to prevent it from being viewed by anyone who is not the intended recipient. Any website that has an HTTPS certificate uses encrypted data.

Front End / Back End

The two different ‘sides’ of a website. The front-end is also known as the client-side and is usually considered the web design. The back-end of the website is also known as the server-side.


A type of software that prevents unauthorized access to or from a particular network. Firewalls can also be implemented in hardware.


Also called a web host, this is a computer accessed by a user working at a remote location. Also refers to a specific computer connected to a TCP/IP network like the Internet.

IP address

The unique identifying number for a website, or a specific user.


Local area network; a network that extends over a small area (usually within a square mile or less). Connects a group of computers for the purpose of sharing resources such as programs, documents, or printers. Shared files often are stored on a central file server.

Managed Services

Managed Service Provider; A business model for providing information-technology services.


Software programs designed to damage or do other unwanted actions on a computer; common examples of malware include viruses, worms, trojan horses, and spyware.


A group of interconnected computers capable of exchanging information. A network can be as few as several personal computers on a LAN or as large as the Internet, a worldwide network of computers.

Network Monitoring

Dataprise Cloud-based Network Monitoring service, can configure and remotely monitor all of your important network systems (e-mail, servers, routers, available disk space, backup applications, critical virus detection, and more). If our system detects a problem, it alerts the Dataprise Technical Support Center, so we can take corrective action. Depending on prearranged instructions from your own network engineers, we’ll correct the problem immediately, wait until the next business day or simply notify you of the issue.


A unit of transmission in data communications. The TCP/IP protocol breaks large data files into smaller chunks for sending over a network so that less data will have to be re-transmitted if errors occur.


A con that scammers use to electronically collect personal information from unsuspecting users. Phishers send emails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions asking you to click on a link included in the email and then update or validate your information by entering your username and password and often even more information, such as your full name, address, phone number, social security number, and credit card number.

Remote Backup

A remote, online, or managed backup service is a service that provides users with a system for the backup and storage of computer files. Dataprise remote backup solution incorporates automatic data compression and secure data encryption. This means that your critical system data backup safely and efficiently. For additional peace of mind, our backup service features proprietary dual tapeless backup protection, including fast incremental backup to a secure on-site hard drive and a second backup to our carrier-grade data center. Our remote backup service is completely automated and immensely secure. You’ll never have to think about the safety of your data again.

SaaS (Software As A Service)

Software as a Service; a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser.


A computer that is responsible for responding to requests made by a client program (e.g., a web browser or an e-mail program) or computer. Also referred to as a “file server”.


Transmission Control Protocol/Internet Protocol; an agreed upon set of rules that tells computers how to exchange information over the Internet. Other Internet protocols like FTP, Gopher, and HTTP sit on top of TCP/IP.


Virtual Private Networking; a means of securely accessing resources on a network by connecting to a remote access server through the Internet or other network.

Wide Area Network

Wide Area Network; a group of networked computers covering a large geographical area (e.g., the Internet).

Phew! That’s quite a list to download into your brain. Hopefully some of these IT tech terms make a bit more sense and will help you to run your IT better. Class dismissed!

If you have questions about managing your IT needs for your business, contact Affant today. We are an IT Managed Services Company based in Orange County and when it comes to us knowing all things IT, you can guarantee that we have you covered.

Go to top