Diode
/ˈdaɪoʊd/
noun … “Semiconductor device that allows current to flow in one direction.”
Diode is a two-terminal electronic component that permits electric current to flow primarily in a single direction while blocking it in the opposite direction. Diodes are fundamental elements in electronic circuits, used for rectification, signal shaping, protection, and voltage regulation. They are built from semiconductor materials, typically silicon, arranged to form a p–n junction.
Amplifier
/ˈæmplɪfaɪər/
noun … “Device that increases signal strength.”
Amplifier is an electronic circuit or device that increases the amplitude of a signal, making it stronger in voltage, current, or power without altering the underlying information it carries. Amplifiers are essential in both analog and digital systems, enabling weak signals from sensors, microphones, or antennas to be processed, transmitted, or reproduced effectively.
Key characteristics of Amplifier include:
Transistor
/ˈtrænzɪstər/
noun … “Semiconductor device for controlling current.”
Transistor is a semiconductor component used to amplify or switch electronic signals and electrical power. It is the fundamental building block of modern electronic devices, including logic gates, microprocessors, memory, and analog circuits. Transistors control current flow through their terminals—typically called the emitter, base, and collector (for bipolar junction transistors) or source, gate, and drain (for field-effect transistors).
Logic Gates
/ˈlɑːdʒɪk ɡeɪts/
noun … “Basic building blocks of digital circuits.”
Logic Gates are fundamental electronic components that perform Boolean operations on one or more binary inputs to produce a single binary output. They form the basis of digital circuits, including processors, memory, and control systems. Logic gates implement basic operations like AND, OR, NOT, XOR, NAND, and NOR, which are combined to create complex computational and control functions.
Key characteristics of Logic Gates include:
Digital-to-Analog Converter
/diː-eɪ-siː/
noun … “Converts digital signals to analog signals.”
DAC (Digital-to-Analog Converter) is an electronic component or system that transforms digital data, typically represented as binary numbers, into a continuous analog signal. DACs are crucial in applications where digital information must interface with the physical world, such as audio playback, video display, instrumentation, and control systems.
Key characteristics of DAC include:
Microcontroller
/ˈmaɪkroʊkənˌtroʊlər/
noun … “Compact CPU with built-in peripherals.”
Antenna
/ænˈtɛnə/
noun … “Device that converts electrical signals to radio waves and back.”
Antenna is a transducer used in radio and wireless communication systems to convert electrical signals into electromagnetic waves for transmission, or to receive electromagnetic waves and convert them back into electrical signals. It serves as the critical interface between a Radio transmitter or receiver and free space, enabling communication without physical conductors.
Key characteristics of Antenna include:
Intrusion Prevention System
/aɪ.piː.ɛs/
noun — "the security guard that stops attacks in their tracks."
IPS, short for Intrusion Prevention System, is a network security device or software that monitors traffic for malicious activity and takes immediate action to block or prevent threats. Unlike IDS, which only detects and alerts, an IPS actively intervenes to stop attacks, unauthorized access, and malware in real time.
Intrusion Detection System
/aɪ.diː.ɛs/
noun — "the alarm system that spots network threats before they strike."
IDS, short for Intrusion Detection System, is a security tool that monitors network or system activity for suspicious behavior or policy violations. It identifies potential attacks, unauthorized access, and malicious activity, alerting administrators so they can respond quickly.
Firewall
/ˈfaɪər.wɔːl/
noun — "the digital gatekeeper that keeps networks safe."
Firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predefined security rules. It protects networks, devices, and applications from unauthorized access, malware, and cyberattacks while allowing legitimate communications to pass through.