💻 Technology

Explore the language of innovation, digital change, and new ideas. This collection helps you follow technology news with greater ease and confidence.

۱۰۰ واژه

واژه‌های این مجموعه

Prompt

B2

To encourage or trigger someone to take action or respond.

Display

B2

to put something in a place where people can see it easily; to show something to people

Exploit

B2

to treat a person or situation as an opportunity to gain an advantage for yourself

App

A2

a piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game

Battery

B1

a device that is placed inside a car engine, clock, radio, etc. and that produces the electricity that makes it work

Camera

A1

a piece of equipment for taking photographs, moving pictures or television pictures. It can be a separate item or part of another device.

Chip

A2

a long thin piece of potato fried in oil or fat

Cloud

A2

a grey or white mass that floats in the sky, made of very small drops of water

Container

B1

a box, bottle, etc. in which something can be stored or transported

Cookie

A2

a small flat sweet cake for one person, usually baked until hard and dry

Laptop

A2

a small computer that can work with a battery and be easily carried

Memory

A2

your ability to remember things

Model

A1

a copy of something, usually smaller than the original object

Privacy

B2

the state of being alone and not watched or interrupted by other people

Smartphone

A2

a mobile phone that also has some of the functions of a computer, for example the facility to use apps and the internet

Software

B1

the programs used by a computer for doing particular jobs

Tablet

A2

a small computer that is easy to carry, with a large touch screen and usually without a physical keyboard

Backup

C1

extra help or support that you can get if necessary

Broadband

C1

a way of connecting to the internet that allows you to receive information, including pictures, etc., very quickly and that is always active (so that the user does not have to connect each time)

Bug

B2

any small insect

Database

B2

an organized set of data that is stored in a computer and can be looked at and used in various ways

Fibre

C1

the part of food that helps to keep a person healthy by keeping the bowels working and moving other food quickly through the body

Hardware

C1

the machines and electronic parts in a computer or other electronic system

Patch

C1

a small area of something, especially one which is different from the area around it

Processor

C1

a machine, person or company that processes things

Surveillance

C1

the act of carefully watching a person suspected of a crime or a place where a crime may be committed

Vulnerability

C1

the fact of being weak and easily hurt physically or emotionally

AI

A technology that simulates human intelligence in machines.

Algorithm

A procedure or formula for solving a problem in mathematics or computer science.

Chatbot

A software application designed to simulate conversation with human users.

Machine learning

A branch of artificial intelligence that focuses on building systems that learn from data.

Dataset

A collection of structured information or data, typically organized in tables or files.

Inference

A conclusion drawn from evidence and reasoning, not directly stated.

Token

A token is an object or an item that represents or signifies something.

Fine-tuning

Making small adjustments to improve function or performance.

Neural network

A system of algorithms modeled on human brain neurons that is designed to recognize patterns.

Automation

The use of technology to perform tasks with minimal human intervention.

Robotics

The branch of technology that deals with the design, construction, operation, and application of robots.

Drone

An unmanned aerial vehicle that can fly autonomously or be controlled remotely.

Self-driving

A vehicle that can drive itself without human input using advanced technology.

Cybersecurity

The practice of protecting computers, networks, and data from theft, damage, or unauthorized access.

Ransomware

Malicious software that blocks access to data until a ransom is paid.

Phishing

The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

Malware

Software designed to disrupt, damage, or gain unauthorized access to computer systems.

Spyware

Software that secretly monitors and collects user data without consent.

Hacking

The act of illegally accessing or manipulating computer systems or networks.

Data breach

Unauthorized access to confidential information.

Zero-day

A newly discovered vulnerability in software that is exploited before the vendor releases a fix.

Encryption

The process of converting information into a code to prevent unauthorized access.

Cryptography

The practice and study of techniques for securing communication and information.

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

Antivirus

Software designed to detect and eliminate computer viruses.

Passkey

A code or device that allows access to a secure system or location.

Biometrics

Methods of measuring biological data to identify individuals.

VPN

A VPN is a service that creates a secure connection over the internet.

Tracker

A person or device that follows or monitors something.

Wearable

Clothing or devices designed to be worn on the body.

Smartwatch

A wristwatch that offers smartphone-like functionalities and applications.

Earbuds

Small, portable speakers worn in the ear for listening to audio.

Headset

A pair of headphones with a microphone, used for listening and communication.