Skip to content
Consult CRA
  • Our Services
    • Managed IT
    • IT Security
    • Cloud Solutions
    • IT Consulting
    • Staffing
  • Why Choose Us
    • History
    • Leadership Team
    • Awards
    • Client Reviews
    • Partnerships
  • Resources
    • Blog
    • White Papers
    • Case Studies
    • IT Glossary
  • Contact Us
    • Write or Call
    • Locations
  • 212-376-4040
  • Login
    • Clients
    • Employees
    • E-commerce

Glossary

  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • L
  • M
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

A Full List of IT Terminology

We’ve compiled a full list of commonly encountered IT terminology that will help you better understand the industry and how it works. By familiarizing yourself with basic computer terms and definitions, you’ll allow yourself to understand manuals, descriptions, and everyday jargon necessary to fully grasp IT products and services.

You’ll find our tech glossary is conveniently laid out below in alphabetical order with an easy navigation interface so you can quickly reference words related to technology.

In addition to our tech terms, you can also find other resources to help you learn more about the role of technology in modern industry, including blogs, whitepapers, and case studies. Though our list of IT terms to know is expansive, if you have any further questions regarding things to know about technology, please contact us.

Z

Zettabyte (ZB)

A Zettabyte (ZB) is a unit of digital information storage equal to one sextillion bytes, or 102110^{21}1021 bytes. To put it into perspective, one zettabyte is equivalent to 1,000 exabytes or one billion terabytes. The term is often used to quantify the massive amounts of data generated globally, especially with the growth of big data, cloud computing, and the Internet of Things (IoT). Understanding data in zettabytes highlights the scale of data storage and transfer in today’s digital landscape.

Zombie Computer

A Zombie Computer is a computer connected to the internet that has been compromised by a hacker, virus, or Trojan horse. It can be controlled remotely without the owner’s knowledge and used to perform malicious tasks, such as sending spam emails, participating in Distributed Denial of Service (DDoS) attacks, or spreading malware. Networks of zombie computers, known as botnets, pose significant cybersecurity threats. Protecting against zombie computers involves using robust antivirus software, firewalls, and keeping systems updated with the latest security patches.

ZIP (File Format)

ZIP is a widely used file format for data compression and archiving. Developed in 1989 by Phil Katz, ZIP allows multiple files and directories to be compressed into a single archive file, reducing storage space and making it easier to transfer over the internet. ZIP files support lossless data compression, ensuring that the original data can be perfectly reconstructed from the compressed data. The format is supported by many software utilities, making it a universal solution for file compression and distribution.

Zigbee

Zigbee is a specification for a suite of high-level communication protocols using low-power digital radios based on the IEEE 802.15.4 standard. It is designed for creating personal area networks with small, low-power devices, making it ideal for applications like home automation, medical data collection, and industrial control systems. Zigbee supports mesh networking, which increases its reliability and range by allowing devices to relay data through one another. Its low power consumption enables devices to operate for years on simple batteries.

Zero-Day Exploit

A Zero-Day Exploit refers to a security vulnerability in software or hardware that is unknown to the parties responsible for patching or fixing the flaw. This exploit is called “zero-day” because developers have zero days to address the issue before it can be used in an attack. Cybercriminals often use zero-day exploits to infiltrate systems, steal data, or cause disruptions before a patch is released. Protecting against zero-day exploits involves implementing robust security measures such as intrusion detection systems, regular system updates, and employing behavior-based threat detection to identify unusual activities.

Contact Us

212-376-4040
hello@consultcra.com

Stay Connected

Computer Resources of America

        NYC | Nassau

Copyright © 2025 Computer Resources of America. All rights reserved.
Privacy Policy
Scroll To Top