Understanding Tech Terms with IT Services
Understanding Tech Terms with IT Services
The world of tech can be frustrating at times – simply because of all the jargon the industry throws at you daily. These terms can be misinterpreted, misunderstood and at worst intimidating.
So below, we break down a range of important tech terms your business will likely come across when dealing with technology and IT services providers.
An error arising when you go to a webpage that doesn’t exist. That’s typically because the webpage has been deleted or maybe you’ve misspelt the URL (see below).
Refers to a part of a particular application that performs a vital task. But you, as the user, don’t even need to think about it as it’s happening. It’s not at the front-end.
Software that is backward compatible means it is compatible with earlier, superseded versions of other software or hardware. The 2010 version of Microsoft Word, for instance, can read 2003 Word files.
The maximum amount of data that can travel down a path of communication.
Break / Fix
Traditional IT services that only respond when IT problems arise. They are more reactive, rather than proactive.
The systems you have in place to clearly outline what you will do if disaster strikes your IT systems (similar to a Disaster Recovery Plan).
Storing and accessing data over the Internet rather than on a separate hard drive. Think Dropbox and iCloud as examples.
Where the cloud stores your data on interconnected servers, as opposed to you hosting in a single server.
Moving your data and processes to a cloud-based solution.
Cookie (or tracking cookie)
A piece of code created by a website server and stored on your computer. It monitors your preferences and your activity.
Measures you put in place to defend your IT systems from cybercriminals. Learn more about Australian cybersecurity threats here.
Disaster recovery plan
A plan to prepare your business in case your IT systems fail or your website crashes.
“Domain name server”. It’s what translates your web address into an IP address (definition below) so you don’t have to type in an IP address if you want to go to a website.
A type of cybersecurity attack where somebody tries to make your computer or network unavailable – typically by trying to flood your network with an overload of information so your systems crash.
Where you can transform your data into an unrecognisable form so unauthorised people cannot access your information.
A security barrier to protect your computer from external connections and networks.
A location within your network allowing it to connect with other networks.
“Integrated Platform as a Service”. A cloud-based platform allowing you to connect with systems in the cloud or on your premises.
“Internet Protocol Address”. A group of numbers assigned to a particular network.
A private group of interconnected networks allowing different computers to communicate with one another.
“Information technology”. Refers to the use of computers to create, store and exchange information electronically.
“Local area network”. Connects devices within a confined area, usually in the same building, through a private network.
Managed IT service provider
MSP for short. An IT service provider providing a proactive (rather than just a reactive) customer service to deliver IT solutions for organisations.
Email fraud where somebody sends you emails appearing to come from somebody legitimate, but aim to deceive you into providing personal or financial information.
“Post office protocol”. A protocol used by an ISP (see above) to handle your email.
“Random access memory” (sometimes just referred to as memory). RAM stores information used by your computer. The larger the RAM, the more your computer can store (generally).
A form of IT blackmail. Where malicious software blocks access to your systems until money is provided.
Your ability to access your company’s IT network from a remote location, whether it be home or the beach.
“Read only memory”. A computer’s memory than cannot be changed by you.
“Software as a service”. Where you can use a piece of software, provided to you as a centrally hosted service.
“Secure sockets layer”. This allows you to send encrypted messages to other people across the Internet. A URL (see below) that begins with “https” shows that there is an SSL connection.
“Uniform resource locator.” Commonly known as a web address – for example, https://www.gpkgroup.com.au/ is a URL.
IT tech terms aren’t confusing with us
Contact our managed IT services Brisbane team to learn more about how these tech terms interact with your business.
Our support team specialises in creating robust IT services strategies to help your business not only operate smoothly and strengthen its network security, but grow and succeed in the process.