💻 Technology
Explore the language of innovation, digital change, and new ideas. This collection helps you follow technology news with greater ease and confidence.
100 words
Words in this collection
Prompt
B2To encourage or trigger someone to take action or respond.
Display
B2to put something in a place where people can see it easily; to show something to people
Exploit
B2to treat a person or situation as an opportunity to gain an advantage for yourself
App
A2a piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game
Battery
B1a device that is placed inside a car engine, clock, radio, etc. and that produces the electricity that makes it work
Camera
A1a piece of equipment for taking photographs, moving pictures or television pictures. It can be a separate item or part of another device.
Chip
A2a long thin piece of potato fried in oil or fat
Cloud
A2a grey or white mass that floats in the sky, made of very small drops of water
Container
B1a box, bottle, etc. in which something can be stored or transported
Cookie
A2a small flat sweet cake for one person, usually baked until hard and dry
Laptop
A2a small computer that can work with a battery and be easily carried
Memory
A2your ability to remember things
Model
A1a copy of something, usually smaller than the original object
Privacy
B2the state of being alone and not watched or interrupted by other people
Smartphone
A2a mobile phone that also has some of the functions of a computer, for example the facility to use apps and the internet
Software
B1the programs used by a computer for doing particular jobs
Tablet
A2a small computer that is easy to carry, with a large touch screen and usually without a physical keyboard
Backup
C1extra help or support that you can get if necessary
Broadband
C1a way of connecting to the internet that allows you to receive information, including pictures, etc., very quickly and that is always active (so that the user does not have to connect each time)
Bug
B2any small insect
Database
B2an organized set of data that is stored in a computer and can be looked at and used in various ways
Fibre
C1the part of food that helps to keep a person healthy by keeping the bowels working and moving other food quickly through the body
Hardware
C1the machines and electronic parts in a computer or other electronic system
Patch
C1a small area of something, especially one which is different from the area around it
Processor
C1a machine, person or company that processes things
Surveillance
C1the act of carefully watching a person suspected of a crime or a place where a crime may be committed
Vulnerability
C1the fact of being weak and easily hurt physically or emotionally
AI
A technology that simulates human intelligence in machines.
Algorithm
A procedure or formula for solving a problem in mathematics or computer science.
Chatbot
A software application designed to simulate conversation with human users.
Machine learning
A branch of artificial intelligence that focuses on building systems that learn from data.
Dataset
A collection of structured information or data, typically organized in tables or files.
Inference
A conclusion drawn from evidence and reasoning, not directly stated.
Token
A token is an object or an item that represents or signifies something.
Fine-tuning
Making small adjustments to improve function or performance.
Neural network
A system of algorithms modeled on human brain neurons that is designed to recognize patterns.
Automation
The use of technology to perform tasks with minimal human intervention.
Robotics
The branch of technology that deals with the design, construction, operation, and application of robots.
Drone
An unmanned aerial vehicle that can fly autonomously or be controlled remotely.
Self-driving
A vehicle that can drive itself without human input using advanced technology.
Cybersecurity
The practice of protecting computers, networks, and data from theft, damage, or unauthorized access.
Ransomware
Malicious software that blocks access to data until a ransom is paid.
Phishing
The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Malware
Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Spyware
Software that secretly monitors and collects user data without consent.
Hacking
The act of illegally accessing or manipulating computer systems or networks.
Data breach
Unauthorized access to confidential information.
Zero-day
A newly discovered vulnerability in software that is exploited before the vendor releases a fix.
Encryption
The process of converting information into a code to prevent unauthorized access.
Cryptography
The practice and study of techniques for securing communication and information.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
Antivirus
Software designed to detect and eliminate computer viruses.
Passkey
A code or device that allows access to a secure system or location.
Biometrics
Methods of measuring biological data to identify individuals.
VPN
A VPN is a service that creates a secure connection over the internet.
Tracker
A person or device that follows or monitors something.
Wearable
Clothing or devices designed to be worn on the body.
Smartwatch
A wristwatch that offers smartphone-like functionalities and applications.
Earbuds
Small, portable speakers worn in the ear for listening to audio.
Headset
A pair of headphones with a microphone, used for listening and communication.