Course basket

The world of tech can be a confusing place full of complicated terms and theories. This is the first article in a series where we explain important tech terms that you should have at least a basic understanding of. AI AI stands for Artificial Intelligence. It revolves around the creation of intelligent machines that have traits such as speech recognition, learning, planning, problem solving, knowledge, reasoning and perception. Back End This is a software engineering term referring to the behind-the-scenes workings of software like websites and apps. Its purpose is to store and organise data and ensure everything on the front-end works (see definition of front end below). The back end communicates with the front-end when users input information or carry out tasks using a website or app, sending and receiving information that the front-end can interpret and display. Big Data Big data refers to amounts of data so large that they cannot be stored or processed by traditional database management systems. Dealing with big sets of data is a modern challenge as businesses are collecting more and more data that require new technologies to interpret. Big data is useful in identifying insights for businesses and other institutions by finding consumer patterns, behaviours, and relationships. Chatbots Bots are artificially intelligent internet robots that perform automated tasks. An example is a chatbot, which can simulate conversations with humans by text, voice or graphical interfaces. Chatbots can either be scripted (where their behaviour is determined by a set of rules so conversations can only follow predetermined paths) or intelligent (using artificial intelligence, some bots can accept free form of input, such as typing and they learn and improve the more they are used). DDOS Attack DDOS is short for Distributed Denial of Service Attack. It’s a cyber security attack that is intended to cause a system, such as a web server, to crash. This works by infecting multiple computer systems at once, which are then controlled by a master computer system. The infected computers are used to flood a target system with lots of requests, messages or data. This overwhelms the target, causing it to crash, which in turn disables legitimate users from accessing the system. Encoding This is where data is converted into coded a form so it can be read and used by an external program or stored in a more efficient format. For example, media files are often converted into a different format so they take up less disk space (compressing), or so they can be shared more easily. Encryption Unlike encoding, encryption turns data into another format with the purpose of hiding it, this process can only be reversed in a specific way know to specific individuals. Front End This is what the user sees and interacts with when they use a website, app or other software – everything that is visually presented. For example, if you fill out a form on a website, you are interacting with the front-end, which then communicates this information to the back-end. The back-end then performs whatever function you are asking it to do and returns the necessary output information to the front-end for you to see. Growth Hacking This is the term for the process of finding creative new ways of using technology, analytics and product development to increase a company’s growth. Instead of using traditional marketing techniques, growth hacking is all about innovation, thinking outside of the box to drive as much growth as possible whilst spending as little money as possible. Next time, you’ll learn about the difference between HTTP and HTTPS, IP addresses, the world of Java and Machine Learning.
CWA Logo

General Enquiries
01553 761 144

Student Services
01553 815 271

Enquiry

If you would like to ask a question, please complete the form below and we will get back to you as soon as we can.

Invalid Input
Please tell us your first name
Please tell us your surname
Please enter a valid email address
Invalid Input




Please select the types which best describe you
Please tell us what you are enquiring about
This field is required
Invalid Input
Invalid Input