Skip to content
Consult CRA
  • Our Services
    • Managed IT
    • IT Security
    • Cloud Solutions
    • IT Consulting
    • Staffing
  • Why Choose Us
    • History
    • Leadership Team
    • Awards
    • Client Reviews
    • Partnerships
  • Resources
    • Blog
    • White Papers
    • Case Studies
    • IT Glossary
  • Login
    • Clients
    • Employees
    • E-commerce
  • Contact Us
    • Write or Call
    • Locations

Glossary

  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • L
  • M
  • P
  • Q
  • R

A Full List of IT Terminology

We’ve compiled a full list of commonly encountered IT terminology that will help you better understand the industry and how it works. By familiarizing yourself with basic computer terms and definitions, you’ll allow yourself to understand manuals, descriptions, and everyday jargon necessary to fully grasp IT products and services.

You’ll find our tech glossary is conveniently laid out below in alphabetical order with an easy navigation interface so you can quickly reference words related to technology.

In addition to our tech terms, you can also find other resources to help you learn more about the role of technology in modern industry, including blogs, whitepapers, and case studies. Though our list of IT terms to know is expansive, if you have any further questions regarding things to know about technology, please contact us.

A

Agility

Agility refers to the ability to migrate and integrate various changes to systems of technology efficiently. Quick and easy adaptation is crucial to maintaining optimal performance in all IT infrastructures.

Related Resources

  • Migration and Implementation
  • Asset and Vendor Management

Asset Management

Asset management is used to keep track of technology investments of a business to maintain the lifecycle and organize all assets. Proper management ensures a cost-effective approach to getting the most value out of your vendors and investments.

Related Resources

  • Asset and Vendor Management

Anti-virus

An antivirus is a program that exists to protect devices from any variety of cyber viruses and to remove any viruses that exist already.

Related Resources

  • The 17 Types of Cyber Attacks You're Likely To Face
  • Breach

B

Backup

Backup entails the process of creating copies of data that can later be accessed and recovered in the event of deletion of information. Companies can risk considerable lasting damage to their data, downtime and overall business operations if not done often and correctly.

Related Resources

  • Continuity
  • Is Your Business Protected Against Downtime?
  • The Importance of Backups: Restoring Data After A Breach
  • Cost-Effective Data Recovery Support from CRA
  • Backup & Disaster Recovery
  • Data Loss Prevention

Backup & Disaster Recovery

Backup and disaster recovery are a set of policies and procedures that enable the retrieval of data and information that may have been misplaced due to deletion or corruption. It focuses on standard requirements and the appropriate execution plan before a critical event can occur.

Related Resources

  • Continuity
  • Why IT Back Up and Disaster Recovery Solutions are Critical to Healthcare
  • Why is a BDR solution important for your business?
  • Cost-Effective Data Recovery Support from CRA
  • Backup
  • Data Loss Prevention

Breach

A breach, in regards to data, refers to the stealing or taking of information from a system without the consent, awareness, or authorization from the system’s user.

Related Resources

  • The 17 Types of Cyber Attacks You're Likely To Face
  • The Importance of Backups: Restoring Data After A Breach
  • Anti-virus

BYOD

Bring Your Own Device (BYOD) is a system established which allows a user to use their personal devices (mobile phones, tablets, laptops, etc.) for business purposes.

Related Resources

  • Collaboration
  • Pros, Cons and Solutions to Maximize BYOD
  • Learn More About BYOD Strategies For Your Business
  • How to Make the Best of BYOD
  • Collaboration

C

Cloud Storage

Cloud storage refers to a model of data storage where digital information is stored, managed and maintained, and backed up remotely through a cloud computing provider while remaining available for access to a user over a network.

Related Resources

  • Cloud Solutions
  • What is the Cloud?
  • Cost-Saving Benefits of Cloud Computing
  • What to Consider Before Migrating to the Cloud
  • Leveraging the Cloud for Security
  • The Year of the Cloud - Looking Back at 2017
  • Ins & Outs of the Cloud Computing Stack
  • Cloud Storage
  • Private Cloud
  • Public Cloud
  • Hybrid Cloud

Private Cloud

A private cloud allows for more customization and control over data and is only available to a select user or group instead of the general public. They are accessible generally over the internet or a private internal network which allows for a more protected environment.

Related Resources

  • Cloud Solutions
  • Cost-Saving Benefits of Cloud Computing
  • What to Consider Before Migrating to the Cloud
  • Leveraging the Cloud for Security
  • The Year of the Cloud - Looking Back at 2017
  • Ins & Outs of the Cloud Computing Stack
  • Cloud Storage
  • Private Cloud
  • Public Cloud
  • Hybrid Cloud

Public Cloud

A public cloud allows information to be accessed and stored in widespread data centers provided by third-parties and is usually accessible to the general public over the Internet.

Related Resources

  • Cloud Solutions
  • Cost-Saving Benefits of Cloud Computing
  • What to Consider Before Migrating to the Cloud
  • Leveraging the Cloud for Security
  • The Year of the Cloud - Looking Back at 2017
  • Ins & Outs of the Cloud Computing Stack
  • Cloud Storage
  • Private Cloud
  • Public Cloud
  • Hybrid Cloud

Hybrid Cloud

Hybrid cloud allows businesses to seamlessly scale on-premises infrastructure and computing resources by combining a private cloud with public cloud services. This model offers security, scalability, flexibility, and is often the most cost-effective solution to cloud computing.

Related Resources

  • Cloud Solutions
  • Cost-Saving Benefits of Cloud Computing
  • What to Consider Before Migrating to the Cloud
  • Leveraging the Cloud for Security
  • The Year of the Cloud - Looking Back at 2017
  • Ins & Outs of the Cloud Computing Stack
  • Cloud Storage
  • Private Cloud
  • Public Cloud
  • Hybrid Cloud

Cluster

A cluster is defined as a group of servers and other devices that act as a single system to enable high availability and, in some cases, load balancing and parallel processing.

Related Resources

  • Rack

Corrupt Data

Data corruption happens when code or information is intentionally or unintentionally changed from its original correct form and becomes broken, unreadable and sometimes inaccessible. Corruption can be logical or random and usually occurs when a piece of data loses its base integrity that can cause a break in a program or can render a file useless to a user.

Related Resources

  • The Importance of Backups: Restoring Data After A Breach
  • Breach

Collaboration

Collaboration is the process of providing software through different types of network structures that create a consistent user experience through various devices and also stores data off-premises. These tools help drive more efficient work practices and enhance communication in the modern business environment.

Related Resources

  • Collaboration
  • Version Control: Collaborating on Live Projects
  • How to Make the Best of BYOD
  • BYOD

Compliance

Compliance refers to the process of ensuring your business and all its employees are in accordance with established laws, regulations, standards and ethical practices that are relevant to your organization.

Related Resources

  • GDPR
  • HIPAA

CPU

A Central Processing Unit (CPU) is the main component of a computer that processes all instructions. It runs the operating system and applications, continuously receiving input from the user or active software programs, then producing output that is either displayed on a screen or stored in an application.

Related Resources

  • HaaS

CRM

A Customer Relationship Management (CRM) uses a collection of information to provide solutions that improve how you interact and conduct business with a customer. CRM systems and applications are intended to ensure customer relationships are prosperous, track engagements and deliver data.

  • 1
  • 2
  • 3
  • 4
  • 5

Contact Us

212-376-4040
hello@consultcra.com

Stay Connected

Computer Resources of America

        NYC | Nassau

Copyright©️ 2021 Computer Resources of America. All rights reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Reject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
SAVE & ACCEPT
Scroll To Top