Skip to content
Consult CRA
  • Our Services
    • Managed IT
    • IT Security
    • Cloud Solutions
    • IT Consulting
    • Staffing
  • Why Choose Us
    • History
    • Leadership Team
    • Awards
    • Client Reviews
    • Partnerships
  • Resources
    • Blog
    • White Papers
    • Case Studies
    • IT Glossary
  • Contact Us
    • Write or Call
    • Locations
  • 212-376-4040
  • Login
    • Clients
    • Employees
    • E-commerce

Glossary

  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • L
  • M
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

A Full List of IT Terminology

We’ve compiled a full list of commonly encountered IT terminology that will help you better understand the industry and how it works. By familiarizing yourself with basic computer terms and definitions, you’ll allow yourself to understand manuals, descriptions, and everyday jargon necessary to fully grasp IT products and services.

You’ll find our tech glossary is conveniently laid out below in alphabetical order with an easy navigation interface so you can quickly reference words related to technology.

In addition to our tech terms, you can also find other resources to help you learn more about the role of technology in modern industry, including blogs, whitepapers, and case studies. Though our list of IT terms to know is expansive, if you have any further questions regarding things to know about technology, please contact us.

T

Thin Client

A Thin Client is a lightweight computer or program that relies heavily on a server to perform computational roles. Unlike traditional desktop PCs, thin clients have minimal processing capabilities and storage, serving primarily as an interface for input and output. They connect to a server where the actual processing, data storage, and application execution occur. Thin clients are cost-effective, easier to manage, and enhance security by centralizing data and application management, making them ideal for enterprise environments with centralized computing needs.

Two-Factor Authentication (2FA)

Two-Factor Authentication (2FA) is a security process that requires users to provide two distinct forms of identification before accessing an account or system. Typically, 2FA combines something the user knows (like a password) with something the user has (such as a physical token or a mobile device) or something the user is (biometric data like fingerprints). Implementing 2FA significantly enhances security by adding an extra layer of protection against unauthorized access, even if passwords are compromised.

Trojan Horse

A Trojan Horse, often simply called a Trojan, is a type of malicious software that misleads users about its true intent. Disguised as legitimate or benign software, Trojans trick users into executing them, thereby granting unauthorized access to the user’s system. Once activated, a Trojan can perform various harmful actions such as stealing sensitive data, installing additional malware, or creating backdoors for remote access. Protecting against Trojans involves using reputable antivirus software, avoiding downloads from untrusted sources, and exercising caution with email attachments and links.

Terabyte (TB)

A Terabyte (TB) is a unit of digital information storage equivalent to approximately one trillion bytes, or precisely 1,024 gigabytes (GB). Terabytes are commonly used to measure the storage capacity of large storage devices like hard drives, solid-state drives, and data storage systems. As data generation continues to grow exponentially, terabyte-sized storage solutions have become standard in both consumer and enterprise environments, accommodating high-resolution multimedia files, extensive databases, and large-scale applications.

Transmission Control Protocol/Internet Protocol (TCP/IP)

Transmission Control Protocol/Internet Protocol (TCP/IP) is the foundational suite of communication protocols used to interconnect network devices on the internet. TCP/IP dictates how data is packetized, addressed, transmitted, routed, and received across networks. TCP ensures reliable transmission by managing data segmentation and reassembly, error detection, and retransmission of lost packets. IP handles addressing and routing, ensuring that data packets reach the correct destination. Together, TCP/IP enables diverse computing devices to communicate over vast, interconnected networks, forming the backbone of internet communications.

Contact Us

212-376-4040
hello@consultcra.com

Stay Connected

Computer Resources of America

        NYC | Nassau

Copyright © 2025 Computer Resources of America. All rights reserved.
Privacy Policy
Scroll To Top