Lara explains the IT world - part 3!

Feel free to Share this Article:

Illustration to show the explanation of IT terms

Author: Lara Schärer

Category: IT Basics

January 14, 2020

For the start of the new year there are 5 new IT terms that I would like to explain to you. Namely JavaScript, Bit, IP, Dedicated Server and Trojan. Have fun!

JavaScript

JavaScript is one of many programming languages. But what is a programming language? Quite simply, for a computer or processor to execute certain commands, the command must be written in a programming language. JavaScript is suitable for creating various commands in web development. For example, to check form fields (telephone number, e-mail address, etc.).

Bit

A computer uses so-called binary codes, which consist of bits. These bits always have either the state 0 or 1. To form the letter A, for example, the following bits are strung together: 01000001. But what does this mean exactly? A bit is also a memory unit. More precisely, it is the smallest memory unit in electronic data processing. The next larger unit would be a byte. To obtain 1 byte, 8 bits are strung together (see example with letter). This is followed by kilobyte, megabyte and gigabyte.

IPv4

IP is the abbreviation for Internet Protocol, where v4 stands for version 4. Every computer has an IP, which is comparable to a house number. For example, if you want to access a server, the computer needs to know exactly where this server is located. Therefore the "house number" is needed. An IPv4 address consists of 4 parts with the number range 0-255.

Dedicated Server

The translation in German means something like "assigned server". This means that the entire resources of a server are available to a single client. This is also a physical server and not a virtual server.

Trojan

A Trojan horse is also called a Trojan horse. Why horse? Because the Trojan horse was used in Greek mythology to camouflage attacks. Technically speaking, a Trojan horse is a malicious computer program that is disguised as a conventional program and pretends to function normally on the outside. After installing the supposed program, your computer is misused by the attacker for this purpose.

All right, or do you just have a term for IT that you just don't understand? Then just send us a mail to contact@xelon.ch and we will explain the term in detail in the next blog.

false

Lara Schärer

Subscribe to our newsletter!

Don't miss any of our IT blogs and be the first to know about Xelon news or offers.

Related News

Business IT infrastructure Cloud

For access to your IPMI you will receive a secure VPN access from us. After establishing the VPN...

January 10, 2019

1 mins read

IT Basics

Have you already had enough of our IT terms? We definitely don't, because there are still countless...

February 6, 2020

1 mins read

Tech-Trends

The Internet of Things (IoT) is not only gaining ground in private households and large companies....

September 13, 2021

5 mins read

Company News

Customer orientation, quality management and highest security standards are more than just...

July 23, 2020

3 mins read