Central Processing Unit (CPU)
The brain of a computer, performing most processing tasks by executing instructions from programs.
Arithmetic Logic Unit (ALU)
A component of the CPU that performs arithmetic and logical operations.
Control Unit (CU)
Manages the execution of instructions and directs data flow within the CPU.
Registers
Small, fast storage locations within the CPU used to hold temporary data and instructions.
Motherboard
The main circuit board that connects all components of a computer, including the CPU, memory, and storage.
RAM (Random Access Memory)
Volatile memory used for temporary storage while the computer is running.
ROM (Read-Only Memory)
Non-volatile memory that stores firmware essential for booting the computer.
Cache Memory
High-speed memory located close to the CPU that stores frequently accessed data and instructions.
Input Devices
Hardware components that allow users to interact with and provide data to the computer.
Output Devices
Hardware components that convey processed data from the computer to the user in a readable form.
Hard Disk Drives (HDD)
Magnetic storage devices used for long-term data storage.
Solid-State Drives (SSD)
Faster, more reliable storage devices using flash memory.
Operating System (OS)
System software that manages hardware resources, facilitates user interaction, and serves as a platform for application software.
Antivirus Software
Utility software that protects the system from malware and viruses.
LAN (Local Area Network)
A network that connects computers and devices within a limited geographic area.
WAN (Wide Area Network)
A telecommunications network that extends over large geographic areas, connecting multiple LANs.
Star Topology
A network topology where all devices are connected to a central hub or switch.
Bus Topology
A network topology with a single central cable to which all devices are connected.
Ring Topology
A network topology where each device is connected to two other devices, forming a circular data path.
Mesh Topology
A network topology where each device is connected to every other device, providing high redundancy and reliability.
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
Phishing
A cyberattack aimed at deceiving individuals into revealing sensitive information by masquerading as a trustworthy entity.
Firewall
A network security system that monitors and filters incoming and outgoing network traffic based on security rules.
Encryption
The process of transforming data into an unreadable format to protect it from unauthorized access.
Von Neumann Architecture
A system where the CPU runs programs stored in memory, with the concept of stored program.
Fetch-Decode-Execute Cycle
The process by which a CPU retrieves a program instruction from memory, decodes it, and then executes it.
Binary System
The base-2 numeral system used by computers to represent and process data, using only two digits: 0 and 1.
Hexadecimal System
The base-16 numeral system used in computing to simplify the representation of binary data.
ASCII (American Standard Code for Information Interchange)
A character encoding standard used to represent text in computers and communication devices.
Unicode
A comprehensive character encoding standard designed to represent text and symbols from virtually all written languages.