C2 Level Wordlist - Technology and Internet
Here you will learn all the essential words for talking about Technology and Internet, collected specifically for level C2 learners.
Review
Flashcards
Spelling
Quiz
a technology that allows devices to be connected to a computer system and used without requiring extensive installation or configuration
a small hardware device that connects to a computer, smartphone, or other electronic device to provide additional functionality
the process of converting data into a coded form to prevent unauthorized access
a set of rules used by digital systems to decide what content to show users based on their behavior and preferences
a type of switch used in user interfaces to turn a single setting on or off
a program that automatically loads and initializes the operating system on a computer
the time it takes for data to travel from one point to another in a network
the ability of different systems, software, or devices to seamlessly communicate, exchange data, and work together effectively
a set of protocols and tools that allows different software applications to communicate with each other
a network for communication between computers, usually within a building
a computer or device on a network that provides services, resources, or data to other computers or devices, known as clients
a type of educational software or online materials designed for teaching specific subjects or skills
a harmful program that pretends to be legitimate and can give unauthorized access to a device
to set up a system, device, software, or components in a specific way to achieve a desired functionality
to send a signal to a computer and wait for a reply as a way to test the connection
a technology that overlays computer-generated information, such as images or data, onto the real world, enhancing the user's perception and interaction with their environment
to make a process, task, or system operate automatically, often through the use of technology or machinery, reducing the need for manual intervention
a part of a computer responsible for storing and controlling data where users cannot easily access
an individual who engages in unauthorized attempts to access computer systems, networks, or software, often with malicious intent