Less is More

Less is MoreLess is MoreLess is More
Home
The Author
Solutions
Topics
Topic du Jour
Words to Live By
Call to Action

Less is More

Less is MoreLess is MoreLess is More
Home
The Author
Solutions
Topics
Topic du Jour
Words to Live By
Call to Action
More
  • Home
  • The Author
  • Solutions
  • Topics
  • Topic du Jour
  • Words to Live By
  • Call to Action
  • Home
  • The Author
  • Solutions
  • Topics
  • Topic du Jour
  • Words to Live By
  • Call to Action

DEFINITIONS

Priority


4G / 5G: Mobile internet speeds. 5G is faster.
AI (Artificial Intelligence): Computers doing tasks that usually need human intelligence.
Algorithm: Automated rules that decide what you see online.
App: Software you use for a task.
App store: Where you download apps.
Backup: A second copy of your data, kept safe in case you lose the original.
Bandwidth: How much data your connection can handle at once.
Battery cycle: One full charge and discharge – batteries wear out after many cycles.
Blockchain: A digital ledger for tracking transactions.
Bluetooth: Connects things wirelessly, like headphones.
Cloud: Storing and using services online instead of on your device.
Cookie: Small file a website saves in your browser, often for tracking or logins.
Copyright: Legal right granting creators control over copying and distribution.
Crypto / Cryptocurrency: Digital money like Bitcoin.
Data breach: When personal information is leaked or stolen.
Digital footprint: The trail of everything you do online.
Encryption: Scrambles your information so outsiders can’t read it.
End-to-End Encryption (E2EE): Only you and the person you’re messaging can read the conversation. Not even the app provider can.
Gigabyte (GB, ~1,000 MB): A feature-length film, about 200 songs, or several hundred photos.
Hotspot: Using your phone’s data to get another device online.
IP address: The online “address” of your device.
Notification / Push notification: An alert that pops up on your phone.
Password manager: Stores and creates strong passwords so you don’t have to remember them.
Phishing: Fake emails or messages trying to trick you into handing over money or passwords.
RAM: Short-term memory that apps use while running.
Resolution: How detailed a screen image is (e.g. 4K).
Router: The box that connects your home to the internet.
Streaming: Watching or listening without downloading the whole file first.
USB-C: A newer, reversible charging and data cable.
VoIP: Calls made over the internet (Zoom, Teams).
VPN: Makes your internet connection private and hides your location.
Wi-Fi: Wireless internet connection.
Wireless charging: Charging without plugging in a cable.


Others


2FA / MFA: A second step when logging in (like a text code or fingerprint). Makes accounts much harder to hack.
AR / VR: Augmented and virtual reality (e.g., AR overlays on your phone, VR headsets).
Bit: The smallest unit of computer information, like a light switch that can only be off (0) or on (1).
Byte (B): 8 bits, enough for one letter, number or symbol.
Case Study - Bits and Bytes: See definitions for Bit, Byte, Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte, Exabyte, Zettabyte, Yottabyte.
Compression: Shrinks file size (sometimes with quality loss).
CPU: The main processor (the device’s “brain”).
Dark mode: Light text on a dark background.
Dark pattern: Tricks in app design that push you into bad choices (like making “unsubscribe” hard to find).
Digital Markets Act (DMA): EU rules curbing gatekeeper power of big tech firms.
Digital Services Act (DSA): EU legislation setting duties for online platforms to tackle illegal content.
DMCA (US): American copyright law with notice-and-takedown for online infringements.
DNS: Like the internet’s phone book - it turns web names into numbers.
Driver: Lets the OS talk to hardware like printers.
ePrivacy Directive (Cookie Law): EU rule requiring consent for non-essential cookies.
Exabyte (EB): Data handled by the entire internet in a single day.
Fair dealing (UK): Limited legal exceptions to copyright for criticism, news, study.
Freemium: Basic features free, extras cost money.
GDPR: Law that protects your data in the UK/EU.
Generative AI: AI that creates text, images or sound (like ChatGPT).
GPU: Processor for graphics and video.
Green IT: Technology designed to reduce environmental impact.
HDMI: Cable for connecting screens and TVs.
HTTPS: Secure websites (padlock icon in the browser).
ICO (Information Commissioner’s Office): UK authority enforcing data protection law.
Incremental backup: Only saves the new changes since the last backup.
In-app purchase: Buying extras inside an app.
Investigatory Powers Act (IPA, “Snooper’s Charter”): UK law expanding surveillance and data-retention powers.
Jailbreaking / rooting: Unlocking a device’s restrictions – usually risky.
Kilobyte (KB, ~1,000 bytes): A short email or paragraph of text.
Latency / ping: The delay - lower is better for video calls and gaming.
Location services: Uses GPS to track your position.
Machine Learning: AI that improves by learning from data.
Megabyte (MB, ~1,000 KB): A selfie or a short song.
Metadata: Information about your activity (like who you messaged and when) even if the actual content is hidden.
Metaverse: A virtual world concept combining AR/VR.
Moderator: Person or system that polices online content.
Motherboard: The main board all parts connect to.
Net neutrality: Principle that ISPs must treat all lawful traffic equally.
NFT: A unique digital “certificate” often tied to art.
NFC: What powers contactless payments.
OLED / LCD: Types of screens - OLED usually looks sharper.
Open source: Free code anyone can look at and change.
Operating System (OS): The main software that runs your device (Windows, iOS, Android, etc.).
Patch / update: Software fixes you should install quickly to stay secure.
Petabyte (PB): A vast data centre or all the books in a national library.
Proprietary: Closed code owned by a company.
Refresh rate: How smooth the screen looks (higher feels smoother).
Right to be Forgotten: GDPR provision allowing individuals to request deletion of personal data.
Safe Harbour / intermediary liability: Shield for platforms that promptly remove illegal user content once notified.
Section 230 (US): Protects platforms from liability for most user-generated content.
Sideloading: Installing apps from outside the official store (riskier).
Social engineering: Scams that target you directly (like a fake call from “IT support”).
SSD / HDD: Types of storage - SSDs are faster, HDDs are older and slower.
Targeted advertising: Ads chosen based on your browsing habits.
Terms of Service (ToS): The rules you agree to when using a site or app.
Terabyte (TB, ~1,000 GB): Roughly 1,000 films, 200,000 songs, or years of phone photos.
UI / UX: What you see on-screen (UI) and how easy it feels to use (UX).
Yottabyte (YB): So large it could hold all the data ever created many times over.
Zero-knowledge design: Even the service provider cannot see your data.
Zettabyte (ZB): The world’s internet traffic in a year.

Copyright © 2025 - All Rights Reserved.

  • Privacy Policy