15 Common Information Technology (IT) Abbreviations | Jones IT (2023)

We use many acronyms and abbreviations related to technology in our daily lives. These terms have become so commonplace and we've been using them for so long that we rarely think about what they really mean. You may know what acronyms or abbreviations mean, but you may not know what they really mean or how they are used. Here is a list of 15 of these common technology-related abbreviations with their meanings for your reference.

So the next time your IT tech blurts out one of these things in your conversation, you can just nod your head and say, "I know what it is."


Amazon Web-Servicesis a cloud service platform that provides computing power, database storage, content delivery, and other functions that can be leased by individuals, corporations, government agencies, etc. By using AWS, you can get large computing power faster and cheaper than building your own physical infrastructure.

As of 2017, AWS owns 34% of all cloud computing. Netflix, Twitch, LinkedIn, Facebook, ESPN, Twitter are some of the big names using AWS for their compute and storage needs. The next time you stream a movie or game online, you'll know where it came from.

15 Common Information Technology (IT) Abbreviations | Jones IT (1)

AES - Advanced Encryption System

The advanced encryption system is aCryptographyStandard used to encrypt data to ensure privacy. AES is a symmetric block cipher, i. H. it encrypts blocks of text of a certain size (e.g. 128 bits) instead of encrypting one character at a time. The symmetric part refers to the key used for the process; The same key is used to encrypt and decrypt the data.

Ishistory of aesit's pretty fascinating. AES was originally introduced by the US government but is now used worldwide. The government uses it to encrypt secret documents. For the general public, it might be more interesting to know that it's commonly used in messaging apps like WhatsApp, apps like WinZip, as well as a variety of hardware and technologies that we use every day.

AP - access point

EAccess Point (AP)is networking hardware that connects your wireless devices to your wired network. The AP connected to aRouterÖexchange Through aEthernet cable, is the hub through which your wireless devices connect to your wired LAN (we'll talk about that too).

So the AP simply projects the Wi-Fi signal to a specific area. The next time you need a Wi-Fi signal in a new area like your business rooftop, just run an Ethernet cable and install an access point in that area.

15 Common Information Technology (IT) Abbreviations | Jones IT (2)

API - Application Programming Interface

Application Programming Interface is software that allows two different applications to communicate with each other. Every time you use an app on your phone, you use an API.

For example, flights on an aggregator like Kayak or Skyscanner use APIs to interact with the airline's website. The API is the interface that has direct access to information such as flight routes, prices, baggage options, etc. So when you perform a search on this site, the API forwards your request to the airline's website, receives the response to your request, and transmits the responses to the online travel service, which returns the results.

BYOD: Bring your own device

Bring Your Own Device is a concept that enables employees to use their private devices for work.BYOD is very popular with small businesseswho are just starting out because they free up capital that would otherwise be tied up in equipment. It also offers the added benefit of employee mobility and increased productivity since employees would already be familiar with their devices and there would be no learning curve.

However, there are some downsides to BYOD, the biggest of which are privacy and security concerns. Many of the issues related to BYOD can be solved by using MDM (another acronym we will talk about later in this blog post).

15 Common Information Technology (IT) Abbreviations | Jones IT (3)

CLI: command line interface

Most users rely on mouse and trackpads to interact with their computersgraphical user interface (GUI). But before the mouse, the standard way of interacting with a computer was a command line interface, a text-based interface for entering commands.

There are different types of CLI, the most common isDOS (hard disk operating system)for Windows and thegrenade hitfor Linux and Apple OS, each with its own command syntax. Although most people never use the CLI, they are useful and still included in all major operating systems.

(Video) 100 Abbreviations and Acronyms related to Computer Science and Information Technology | Part 1

Here are some examples of what the command prompt looks like for the top 3 operating systems:

  • Windows (DOS): C:\>

  • OS X (Bash-Shell): Mi-iMac:/ me$

  • Linux (Shell-Bash): [raíz@miservidor /]#

DDoS: Distributed Denial of Service

A distributed denial of service is a malicious attempt to disrupt normal service, server, or network traffic by flooding the infrastructure with an avalanche of fake traffic. In other words, a DDoS attack attempts to create a bottleneck along the route to prevent real traffic from reaching your service, server, or network.

DDoS attacks are initiated by flooding a target system's bandwidth or resources. These attacks are effective because they use a compromised computer network orIoT devices (Internet of Things).as a source of attack traffic. Attackers gain control of large numbers of computers or IoT devices by infecting themMalwareand then use the infected devices likerote Botsto launch your attacks.

FTP file transfer protocol

File Transfer Protocol is a network protocol used to transfer filesa client and a serverin a computer network. FTP is one of many protocols (that you may already be familiar withHTTPjHTTPS) that makes the internet work.

For example, if you want to install WordPress on your web server to host your website, you need to use FTP to copy your files to the server. Although this is less common these days as most businesses use the cloud, some businesses still use FTP for file sharing. Businesses that prefer to host files on their local server use FTP to share files stored on their server. Employees upload files to your FTP server and share links to those files with their colleagues, much like you would share a file on Google Drive.

IP - Internetprotokoll

You may already know that IP stands for Internet Protocol and you may have used the term "IP" a million times, but what does it mean?

IP is the main communication protocol in the Internet Protocol Suite (we already learned about FTP, HTTP, and HTTPS in the previous section). It is a set of rules for routing and addressing data so it can travel across networks and reach the right destination. When transmitted over a network like the Internet, data is broken down into small pieces called packets. Each packet has IP information attached to it, which helps routers send these data packets to the correct address. Every internet-connected device or domain has a unique IP address, and packets are routed to the correct IP addresses using the IP information.

15 Common Information Technology (IT) Abbreviations | Jones IT (5)

ISP – Internet Service Provider

An internet service provider is an organization that provides access to the internet.

To your device, e.g. To connect a laptop, for example, to the Internet, you need special networking, telecommunications, and routing equipment. One type of ISP allows users to "rent" those specific types of devices needed to connect to the Internet. ISPs enable Internet access by routing Internet traffic, resolving domain names, and maintaining network infrastructure.

ISPs are interconnected, and just as individual customers and businesses pay ISPs to access the Internet, these ISPs pay other ISPs, which in turn pay the larger ISPs. If you want to learn more about ISPs, check out this articlehow do providers work.

LAN-Rede Local

Alocal networkIt is aComputer network connecting devicesin a limited physical location, such as B. an office or an apartment. It can be large, like a corporate network with thousands of users and devices, or small, like a home network with one user.

A typical office LAN consists of cables, access points, switches, routers, and other components that allow devices to connect to internal servers and other LANs. A LAN allows connected devices to use a single Internet connection, use shared printers, share files, and even access connected devices.

15 Common Information Technology (IT) Abbreviations | Jones IT (6)

MDM – Mobile Device Management

AMobile device management softwareis a type of security and management software that allows IT administrators to monitor, manage, and secure business or personal mobile devices.

An MDM application is a great security tool and is highly valued by any system administrator as it provides a unified platform to manage all the different devices across the organization. It gives the IT admin remote access to all corporate devices where MDM is installed and allows deploying security patches, configuring settings, updating operating systems and applications. What's more, they can even allow administrators to remotely wipe device data if it's lost or stolen.

(Video) Computer Abbreviations & Acronyms Quiz | 100 Important Questions | Computer Science GK Quiz | MCQ

MFA: Multi-Factor Authentication

Multi-factor authentication is a security system that requires a user to provide different types of credentials to verify their identity. Instead of simply asking for the username/password pair, the user must provide additional credentials, e.g. B. a code sent to the phone.

MFA is a simple and effective way to improve security. The traditional method of identity authentication using a username and password pair is less secure today due to data leaks and social engineering. Using additional credentials to authenticate the user's identity provides a second layer of account security. So even if the username/password is stolen, the account is still protected from cyber criminals.

Here are some examples of multifactor authentication:

  • Physical security keys that connect to your computer via USB or Bluetooth.

  • Small physical devices that display random numbers that change regularly.

  • Biometric data such as fingerprint or retina scan

  • Apps like Google Authenticator that show time-based one-time passwords.

If you want to learn more about MFA, visit our blogHow to set up two-factor authentication

15 Common Information Technology (IT) Abbreviations | Jones IT (7)

RDP-Remote Desktop Protocol

The Remote Desktop Protocol is a Microsoft proprietary protocol that allows users to connect to another computer over a network connection. RDP allows users to view and use Windows on the connected computer. RDP allows the remote computer to use its peripherals like keyboard and mouse to control the connected computer as if you were sitting in front of it.

The RDP connection requires two components: an RDP server and an RDP client. Typically, the computer you connect to or connect to remotely is the server, while the computer you control the server from is the client. Microsoft offers RDP clients for Windows and macOS, while third-party options are available for Linux.

RDP is a useful tool for the IT helpdesk as it allows administrators to remotely diagnose, troubleshoot and resolve technical issues encountered by individual users. However, it should be used with caution as it can be hijacked and misused by cyber criminals.

SSO: Single sign-on

Single sign-on is an authentication technology that allows users to access multiple applications with a single set of credentials. It's like verifying your identity once and granting you access to all your accounts instead of asking you to verify your identity every time you want to access one of your accounts.

SSO is typically used in business environments where applications are assigned to users and managed by an IT team. With SSO, you need to provide your credentials, i. H. Enter your username/password pair once (along with MFA if your business requires it), giving you access to all your connected SaaS applications. SSO is becoming more and more popular because on the one hand it is easy and convenient for the users and on the other hand it is considered to be more secure.

15 Common Information Technology (IT) Abbreviations | Jones IT (8)

This is just a short list of common terms you're likely to encounter in conversations with your IT team. If you want to learn more about technology, subscribe to our newsletter.

Are you looking for IT support without complicated technical jargon? Contact us for exceptional, friendly IT support tailored to your business.

Click here for friendly IT support

If you liked the blog, share it with your friends.

Related content:

How to Choose the Perfect Laptop for Work: A Complete Guide

(Video) 100 Most Commonly used Computer Full Form, Computer Full Form, Abbreviations, full form

How do you choose the right IT service provider for your business?

IT governance for small and medium-sized businesses

Change Management: Principles, Processes and Best Practices

Free blog writing workflow and tools for consistent content creation

Business lifecycle and the role of information technology

(Video) Quincy Jones - Exponential Facts on #XRP #XLM #XDC Part 1

Best work-from-home practices for employees and employers

NAS vs. Server vs. Cloud: Which Data Storage is Right for You?

A case against working from home

A Guide to Decision Making and IT Transformation

About the author

15 Common Information Technology (IT) Abbreviations | Jones IT (19)

He is SubediMarketing Manager at Jones TI

Hari is an online marketer specializing in content marketing. He writes on topics related to IT, security, small business and mindfulness. He is also the founder and CEO of Girivar Kft., a business services company based in Budapest, Hungary.


(Video) Computer Abbreviations For Competitive Exams | Top 100 MCQs


What are the abbreviations for information technology? ›

What is the common abbreviation for technology? ›

List of information technology initialisms
AbbreviationMeaningPrimary Applicability
ADSLAsymmetric digital subscriber lineTelecom
AESAdvanced Encryption StandardSecurity
ANSIAmerican National Standards InstituteOrganization
APIApplication Programming InterfaceSoftware
117 more rows

What are 5 abbreviations? ›

15 English abbreviations you need to know
  • But first, a quick cheat sheet:
  • RSVP – Please reply. ...
  • ASAP – As soon as possible. ...
  • AM/PM – Before midday (morning) and after midday (afternoon) ...
  • LMK – Let me know. ...
  • BRB – Be right back. ...
  • DOB – Date of birth. ...
  • CC/BCC – Carbon copy/blind carbon copy.
Jan 19, 2022

What are common abbreviations examples? ›

Common acronyms
AM/PMAbbreviations for “ante meridiem” and “post meridiem”
PINPersonal identification number
RADARRadio detecting and ranging
RIPRest in peace (this can also be an initialism, as some people say “r” “i” “p”)
SCUBASelf-contained underwater breathing apparatus
19 more rows
6 days ago

What is abbreviation and it Examples? ›

Abbreviation is the process of shortening something, usually a word or phrase, or the shortened version itself. “Mr.” is the abbreviation of “mister,” NASA is the abbreviation of National Aeronautics and Space Administration, etc. (hey, that's an abbreviation too).

What's the meaning of it? ›

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

Does IT stand for information technology? ›

Information technology (IT) is a broad professional category covering functions including building communications networks, safeguarding data and information, and troubleshooting computer problems. Livia Gershon. Aug 11, 2022.

What does the acronym ITR stand for? ›

income tax return: tax return.

What does Itmb stand for? ›

Information Technology Management for Business (ITMB)

What does IMT stand for in IT? ›

IMT stands for “International Mobile Telecommunications'.

The term International Mobile Telecommunications (IMT) is the generic term used by the ITU community to designate broadband mobile systems. It encompasses IMT-2000, IMT- Advanced and IMT-2020 collectively.


1. 150 Most Common Healthcare IT Abbreviations & Its Meaning
(Professional Certifications)
2. commonly used abbreviations of computer Information and communication technology. for all govt exam
3. Common Useful English Daily Abbreviations You Should Know
4. #top 15 #common #stockmarket #abbreviations you should know #knowledge #video
(Smart Trader)
5. 20 COMMON ABBREVIATIONS & ACRONYMS | Learn with examples | English vocabulary
(Learn Easy English)
6. NTA UGC NET - Important General Abbreviations of ICT for Paper I by Abhishek Kumar Jha
(Unacademy Live - NTA UGC NET)


Top Articles
Latest Posts
Article information

Author: Margart Wisoky

Last Updated: 06/09/2023

Views: 5635

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Margart Wisoky

Birthday: 1993-05-13

Address: 2113 Abernathy Knoll, New Tamerafurt, CT 66893-2169

Phone: +25815234346805

Job: Central Developer

Hobby: Machining, Pottery, Rafting, Cosplaying, Jogging, Taekwondo, Scouting

Introduction: My name is Margart Wisoky, I am a gorgeous, shiny, successful, beautiful, adventurous, excited, pleasant person who loves writing and wants to share my knowledge and understanding with you.