DD
DevDash

Developer Glossary

100 essential terms every developer should know — from HTTP status codes to JWT, Base64, regex, and beyond. Clear definitions, examples, and FAQs.

A

ASCII

data

ASCII (American Standard Code for Information Interchange) is a character encoding standard that assigns numbers 0-127 to characters: 0-31 are control characters, 32-127 are printable characters (letters, digits, punctuation). ASCII is the basis for UTF-8 and most modern text encodings.

API Key

security

An API key is a unique identifier string passed in requests to authenticate an application or user accessing an API. API keys are simpler than OAuth but provide less security — they are long-lived, not scoped per-user, and must be kept secret.

AES

security

AES (Advanced Encryption Standard) is the dominant symmetric encryption algorithm, established by NIST in 2001. AES encrypts data in 128-bit blocks using 128, 192, or 256-bit keys. It is fast, hardware-accelerated on modern CPUs (AES-NI instruction set), and used in HTTPS, VPNs, and disk encryption.

Apache HTTP Server

tool

Apache HTTP Server (httpd) is the world's most popular web server software, powering millions of websites. Apache's modular architecture (mod_php, mod_rewrite, mod_ssl) makes it highly configurable. .htaccess files allow per-directory configuration without server restart.

Apache Kafka

tool

Apache Kafka is a distributed event streaming platform designed for high-throughput, fault-tolerant, ordered message processing. Kafka stores messages as an ordered, immutable log that consumers can replay. Used for event sourcing, real-time analytics pipelines, and microservice event buses.

Ansible

tool

Ansible is an open-source IT automation tool for configuration management, application deployment, and orchestration. Ansible uses YAML playbooks to define tasks and runs them over SSH without requiring agents on target machines. It is agentless, idempotent, and widely used for server configuration.

B

C

CSS

web

Cascading Style Sheets (CSS) is a stylesheet language used to describe the visual presentation of HTML documents. CSS controls layout, colors, typography, animations, and responsive design through a cascade of rules applied to HTML elements.

CORS

web

Cross-Origin Resource Sharing (CORS) is a browser security mechanism that controls how web pages can request resources from a different domain than the one that served the page. CORS uses HTTP headers to tell browsers whether to allow or block cross-origin requests.

CSRF

web

Cross-Site Request Forgery (CSRF) is an attack that tricks authenticated users into submitting unwanted requests to a web application. The attacker leverages the victim's active session cookies to perform actions on their behalf without their knowledge.

CSV

data

Comma-Separated Values (CSV) is a plain-text file format for tabular data. Each line is a row, and values in each row are separated by commas. CSV is universally supported by spreadsheet software, databases, and data tools, making it the most portable data exchange format.

Checksum

data

A checksum is a value computed from data used to detect errors or corruption. When you download a file, comparing its checksum with the publisher's value confirms the file arrived intact. Common checksums include MD5, SHA-256, and CRC32.

CRC32

data

CRC32 (Cyclic Redundancy Check 32-bit) is an error-detecting code that produces a 32-bit checksum. CRC32 is extremely fast and used for detecting accidental data corruption in ZIP files, network frames (Ethernet), and disk sectors. It is not cryptographically secure.

Certificate

security

An SSL/TLS certificate (X.509 certificate) is a digital document that binds a cryptographic public key to an identity (domain name, organization). Certificates are issued by Certificate Authorities (CAs) and enable HTTPS. Browsers trust certificates signed by recognized CAs.

Cookie

security

An HTTP cookie is a small piece of data stored by the browser and automatically sent with requests to the same domain. Cookies are used for session management, user preferences, and tracking. Cookie attributes (HttpOnly, Secure, SameSite) control security behavior.

CORS Policy

security

A CORS (Cross-Origin Resource Sharing) policy is the set of HTTP headers a server sends to control which origins can access its resources. The policy is enforced by browsers to prevent malicious sites from making unauthorized cross-origin requests on behalf of users.

Cron Expression

format

A cron expression is a string of 5-6 fields defining a recurring schedule for automated tasks. Cron is the Unix job scheduler; cron expressions are also used in cloud functions, CI/CD pipelines (GitHub Actions), and backend frameworks to schedule periodic jobs.

Content-Type

format

The Content-Type HTTP header indicates the media type of the resource. For request bodies, it tells the server how to parse the payload. For responses, it tells the browser how to render the content. Content-Type is one of the most important HTTP headers.

CI/CD

tool

CI/CD (Continuous Integration/Continuous Delivery or Deployment) is a software development practice combining automated testing (CI) with automated release (CD). CI runs tests on every commit; CD automatically deploys passing code to staging or production. CI/CD reduces manual errors and deployment risk.

D

E

F

G

H

HTML

web

HyperText Markup Language (HTML) is the standard markup language for creating web pages. It defines the structure and semantic meaning of web content using elements represented by tags. Browsers parse HTML to render the visual structure of a page.

HTTP

web

Hypertext Transfer Protocol (HTTP) is the foundation of data communication on the World Wide Web. It is an application-layer protocol that defines how messages are formatted and transmitted between clients (browsers) and servers. HTTP is stateless — each request is independent.

HTTPS

web

HTTPS (HTTP Secure) is the secure version of HTTP, using TLS (Transport Layer Security) to encrypt communications between browser and server. HTTPS ensures data integrity, authentication, and confidentiality. It is now required for all production websites.

Hexadecimal

data

Hexadecimal (hex) is a base-16 numeral system using digits 0-9 and letters A-F. Hex is widely used in programming because each hex digit represents exactly 4 bits, making it a compact representation of binary. Colors, memory addresses, and byte values are commonly written in hex.

Hash

data

A hash (or digest) is a fixed-length output produced by a hash function from any-length input. Hash functions are deterministic (same input → same hash), one-way (cannot reverse), and produce drastically different outputs for similar inputs (avalanche effect). Used for data integrity and passwords.

HMAC

data

HMAC (Hash-based Message Authentication Code) is a type of message authentication code that uses a cryptographic hash function combined with a secret key. HMAC provides both data integrity and authentication — verifying the message was created by the holder of the secret key.

HTTP Header

format

HTTP headers are key-value pairs sent at the start of HTTP requests and responses. They convey metadata about the request or response: content type, caching instructions, authentication tokens, encoding, and more. Headers are case-insensitive and human-readable.

I

J

K

L

M

N

O

P

Q

R

REST API

web

Representational State Transfer (REST) API is an architectural style for building web services. REST APIs use HTTP methods (GET, POST, PUT, DELETE) and standard URLs to expose resources. They are stateless, cacheable, and the dominant pattern for web service design.

Responsive Design

web

Responsive web design is an approach to building websites that adapt their layout and content to fit different screen sizes and devices. It uses CSS media queries, flexible grids, and fluid images to create a single codebase that works well on phones, tablets, and desktops.

RSA

security

RSA (Rivest–Shamir–Adleman) is the most widely used asymmetric cryptographic algorithm. RSA security is based on the computational difficulty of factoring large integers. It is used for TLS key exchange, digital signatures, and SSH keys. Key sizes of 2048-bit+ are recommended.

Regular Expression

format

A regular expression (regex) is a sequence of characters defining a search pattern. Regex is used for string matching, validation, extraction, and substitution in virtually all programming languages. Despite complex syntax, regex is an essential tool for text processing.

Redis

tool

Redis (Remote Dictionary Server) is an open-source in-memory data structure store used as a database, cache, and message broker. Redis supports strings, hashes, lists, sets, sorted sets, and more. Its in-memory nature makes it extremely fast (microsecond latency) but requires careful memory management.

RabbitMQ

tool

RabbitMQ is an open-source message broker implementing the AMQP protocol. It decouples application components by queuing messages between producers and consumers. RabbitMQ supports complex routing with exchanges and bindings, making it ideal for task queues, event-driven architectures, and microservice communication.

S

SHA-256

data

SHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function from the SHA-2 family that produces a 256-bit (64-character hex) digest. It is the current standard for data integrity, digital signatures, and certificate fingerprints. Bitcoin uses SHA-256 for proof-of-work.

SHA-512

data

SHA-512 is a cryptographic hash function in the SHA-2 family producing a 512-bit (128-character hex) digest. It is faster than SHA-256 on 64-bit processors due to 64-bit word operations. SHA-512 is used in high-security applications where maximum hash strength is required.

Salt

data

A salt is random data added to a password before hashing. Salting ensures that identical passwords produce different hashes, preventing rainbow table attacks and revealing that two users have the same password. Modern password hashing algorithms (bcrypt, argon2) include salt automatically.

SSL/TLS

security

SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are cryptographic protocols that provide encrypted communication over the internet. TLS is used in HTTPS, email (SMTP/IMAP), VPNs, and any application requiring secure data transmission. SSL is deprecated; TLS 1.3 is current.

Session

security

A web session is a server-side storage mechanism that associates user data with a unique session ID. The session ID is sent to the client (usually as a cookie) and included in subsequent requests. Sessions enable stateful interactions (login state) over stateless HTTP.

Socket

protocol

A network socket is a software endpoint for sending and receiving data across a network, identified by an IP address and port number pair. Sockets are the low-level API for network programming; HTTP, WebSocket, and all network protocols are built on top of sockets.

SSH

protocol

Secure Shell (SSH) is a cryptographic network protocol for secure remote login, command execution, file transfer (SFTP/SCP), and port forwarding. SSH replaced insecure protocols like Telnet and FTP. It uses public-key authentication and encrypts all communication.

SMTP

protocol

Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending email. SMTP servers relay email from sender to recipient's mail server on port 25 (server-to-server), 587 (submission with auth), or 465 (SMTPS). Receiving email uses IMAP or POP3.

SVG

format

Scalable Vector Graphics (SVG) is an XML-based format for 2D vector graphics. SVGs scale without quality loss at any resolution, making them ideal for icons, logos, and illustrations. SVGs can be styled with CSS, animated, and manipulated with JavaScript.

T

U

URL Encoding

data

URL encoding (percent-encoding) converts characters that are not allowed in URLs into a safe format by replacing them with a % followed by two hexadecimal digits. Spaces become %20 or +, special characters like & and = are encoded when used in query parameters.

UTF-8

data

UTF-8 is a variable-length character encoding for Unicode. It represents each character using 1 to 4 bytes and is the dominant encoding on the web (used by ~98% of websites). UTF-8 is backward compatible with ASCII — the first 128 characters use one byte each.

Unicode

data

Unicode is a universal character set standard that assigns a unique code point (number) to every character in every writing system, including emoji and symbols. The Unicode Standard covers over 149,000 characters across 161 scripts. UTF-8, UTF-16, and UTF-32 are encodings of Unicode.

UDP

protocol

User Datagram Protocol (UDP) is a connectionless, best-effort transport-layer protocol. UDP sends packets without establishing a connection or guaranteeing delivery, order, or duplicate protection. This makes UDP faster than TCP and suitable for real-time applications.

UUID

format

A UUID (Universally Unique Identifier) is a 128-bit identifier formatted as 32 hex digits in 5 groups (xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx). UUIDs are designed to be unique across all systems without central coordination. UUID v4 is random; UUID v7 is time-sortable.

ULID

format

ULID (Universally Unique Lexicographically Sortable Identifier) is a 128-bit identifier that combines a 48-bit timestamp with 80 bits of randomness. ULIDs are URL-safe, case-insensitive, and lexicographically sortable — solving UUID v4's random ordering problem for database indexes.

Unix Timestamp

format

A Unix timestamp is the number of seconds that have elapsed since January 1, 1970 00:00:00 UTC (the Unix Epoch). Unix timestamps are timezone-independent, easy to compare and sort, and the standard for representing time in Unix/Linux systems and APIs.

User-Agent

format

The User-Agent HTTP request header identifies the application, operating system, vendor, and version making the request. Browsers send a User-Agent string so servers can tailor responses. User-Agent strings are also used for analytics, bot detection, and feature detection.

URL Structure

format

A URL (Uniform Resource Locator) has a defined structure: scheme://userinfo@host:port/path?query#fragment. Each component serves a specific purpose in locating and accessing internet resources. Understanding URL structure is fundamental to web development and REST API design.

V

W

X

Y

Want API access + no ads? Pro coming soon.