FinTechTerms

Multilingual fintech glossary for academic and production-grade learning.

Languageruentr
Topic hub

AI and data in finance

Connect machine intelligence, analytics, and financial interpretation with a shared working vocabulary.

Analytical systems

AI and data vocabulary becomes valuable when it is anchored in financial use cases: forecasting, anomaly detection, ranking, recommendation, and execution support. This hub ties general technical terms to those financial outcomes.

Model language

Terms such as machine learning, NLP, and predictive analytics are often used loosely in fintech marketing. This hub separates the actual technical meaning of each term from broad branding language.

Data dependence

Financial AI is only as strong as the data and market framing behind it. This topic therefore sits next to market microstructure and crypto infrastructure, where the quality and timing of data shape the validity of analytics.

Source framework

Terms in this hub

Inflation

A sustained increase in the general price level.

Opportunity Cost

The loss of potential gain from other alternatives when one alternative is chosen.

Operational Risk

Risk of loss from failed internal processes or systems.

Premium

Amount paid for an insurance policy.

Deductible

Amount paid out of pocket before insurance covers.

Claim

Formal request for payment under insurance policy.

Capital Gains

Profit from selling an asset for more than purchase price.

Stop Loss

Order to sell when price falls to a certain level.

Hostile Takeover

Acquisition of a company against management wishes.

Due Diligence

Comprehensive appraisal of a business.

CDS

Credit Default Swap; insurance against default.

Money Laundering

Concealing origins of illegally obtained money.

Capital Gain

Profit from selling an asset.

Default

Failure to repay a loan.

Supply Chain

Network between company and suppliers.

Retail

Selling goods to consumers.

Appraisal

Assessment of property value.

Capital Gains Tax

Tax on profit from asset sale.

Audit Trail

Records showing history of transactions.

Benchmarking

Comparing performance against best practices.

Fixed Cost

Cost that remains constant.

Crowdfunding

Raising money from many people online.

Rally

Sustained price increase.

Maturity

Date when bond principal is repaid.

Retained Earnings

Profit kept for business.

Supply

Amount of goods available.

Annuity

Fixed sum paid yearly.

Profit

Financial gain.

Crowdsourcing

Obtaining services from crowd.

Free Cash Flow

Cash available for investors.

Payout Ratio

Percentage of earnings paid as dividends.

Fundamental Analysis

Evaluating value based on data.

Return on Investment

Gain relative to cost.

Laissez Faire

Free market with no intervention.

Forfaiting

Purchase of exporter receivables.

Predatory Lending

Unfair loan terms.

Co-pay

Fixed fee paid by patient.

Trailing Stop

Stop loss moving with price.

Clawback

Reclaiming money given.

PCI DSS

Payment Card Industry Data Security Standard.

DApp

Decentralized Application running on a blockchain.

FUD

Fear, Uncertainty, and Doubt.

Airdrop

Free distribution of cryptocurrency.

Flash Loan

Uncollateralized loan repaid in same transaction.

Sharding

Splitting blockchain aimed at scalability.

Sybil Attack

Creating fake identities to gain influence.

Hard Fork

Radical change to blockchain rules.

Block Explorer

Tool to view blockchain data.

Testnet

Alternative blockchain for testing.

Mainnet

The primary blockchain network.

Cross-Chain

Interoperability between blockchains.

Bridge

Connection to transfer assets between chains.

Distributed Ledger

Database shared across network.

Fork

Split in the blockchain network.

GDPR

General Data Protection Regulation.

Webhook

Automated data delivery.

Genesis Block

First block of a blockchain.

Chatbot

AI software for chat.

Air Gap

Offline security measure.

Sidechain

Blockchain linked to main chain.

Layer 1

Base blockchain protocol.

Block Height

Number of blocks in chain.

Reentrancy Attack

Calling a function recursively to drain funds.

Modular Blockchain

Separating execution from consensus.

Data Availability

Guarantee that data is published.

Restaking

Staking the same ETH again.

Oracles

Real world data for blockchain.

Privacy Coin

Crypto hiding transaction details.

Verkle Trees

Data structure for stateless clients.

Blobspace

Data storage for rollups.

Layer 3

App-specific chains on L2.

Base Layer

L1 blockchain.

Layer 0

Network infrastructure underlying Layer 1 blockchains.

BEP-20

Token standard on Binance Smart Chain.

Decentralized Identifier (DID)

Self-sovereign digital identity on blockchain.

Crypto Bridge

Protocol connecting two different blockchains.

Cardano

Proof-of-Stake blockchain platform.

Solana

High-performance blockchain using Proof of History.

Polkadot

Protocol connecting different blockchains.

Cosmos

Internet of Blockchains.

Transaction Fee

Fee paid to process a transaction.

Algorithmic Stablecoin

Stablecoin maintaining peg via algorithms.

Epoch

Time period in blockchain protocols.

Hard Cap

Maximum money a project wants to raise.

Whitepaper

Document explaining a crypto project.

Circulating Supply

Number of tokens currently available.

Shorting

Betting against an asset.

Snapshot

Off-chain voting platform.

Shilling

Promoting a coin for personal gain.

Supply Chain Finance

Financing the supply chain processes.

Database

Organized collection of data.

SQL

Structured Query Language.

Primary Key

Unique identifier for a record in a table.

Foreign Key

Field linking to the primary key of another table.

Algorithm

Set of rules to solve a problem.

Cloud Computing

Delivery of computing services over the internet.

Big Data

Large, complex datasets.

Machine Learning

AI that learns from data.

AI

Simulation of human intelligence by machines.

Backend

Server-side of an application.

Frontend

Client-side of an application.

Full Stack

Development of both frontend and backend.

Agile

Iterative software development methodology.

Scrum

Framework implementing Agile.

ERP

Enterprise Resource Planning software.

CRM

Customer Relationship Management system.

SaaS

Software as a Service; cloud-based software.

UI

User Interface; visual part of app.

UX

User Experience; how user feels using app.

Deep Learning

ML using neural networks with multiple layers.

Natural Language Processing

AI field for understanding human language.

Data Mining

Discovering patterns in large datasets.

Predictive Analytics

Using data to predict future outcomes.

Neural Network

Computing system inspired by biological brain.

Data Visualization

Graphical representation of information and data.

Business Intelligence

Technologies for analyzing business data.

Phishing

Fraudulent attempt to obtain sensitive information.

Data Breach

Security incident exposing confidential information.

Ransomware

Malware that encrypts data and demands payment.

Kubernetes

Open-source container orchestration platform.

Docker

Platform for developing and running containerized apps.

CI/CD

Continuous Integration/Continuous Deployment.

Microservices

Architecture where apps are built as small, independent services.

Serverless

Cloud model where provider manages server infrastructure.

IaaS

Infrastructure as a Service.

PaaS

Platform as a Service.

Load Balancer

Distributes network traffic across multiple servers.

CDN

Content Delivery Network for fast content distribution.

DevOps

Practices combining software development and IT operations.

Scalability

Ability to handle growing amount of work.

Bandwidth

Maximum data transfer rate.

Malware

Malicious software.

Bug

Error in software.

Debugging

Process of finding bugs.

Framework

Platform for developing software.

Library

Collection of pre-written code.

Repository

Storage for code project.

Commit

Saving changes to code.

Merge

Combining code branches.

Deployment

Making software available for use.

Production

Live environment for users.

Staging

Environment mimicking production for testing.

Monolith

Single-tiered software application.

Virtual Machine (VM)

Emulation of a computer system.

Container

Package of software with all dependencies.

E-commerce

Buying and selling online.

Monetization

Process of earning revenue from an asset.

Freemium

Free basic services, paid premium features.

Churn Rate

Rate at which customers stop subscribing.

Retention

Keeping customers over time.

User Acquisition

Gaining new users.

CAC

Customer Acquisition Cost.

LTV

Lifetime Value of a customer.

Conversion Rate

Percentage of users taking desired action.

A/B Testing

Comparing two versions to see which performs better.

Artificial Intelligence

Intelligence demonstrated by machines.

REST

Representational State Transfer.

JSON

JavaScript Object Notation.

NoSQL

Non-relational database management systems.

Server

Computer program/device providing functionality to clients.

Client

Computer hardware/software accessing a server.

Kanban

Visual method for managing work.

Sprint

Short period to complete specific tasks.

User Story

Description of a feature from user perspective.

MVP

Minimum Viable Product.

Innovation

New method, idea, or product.

Digital Transformation

Integration of digital technology into business.

Automation

Use of equipment to reduce human intervention.

Heuristic

Mental shortcut for decision making.

Peer-to-Peer (P2P)

Direct interaction between two parties.

Open Source

Software with source code available to public.

Proprietary

Software owned by an individual or company.

License

Permission to use software.

Cookie

Small data stored on user's computer.

Cache

Temporary storage for fast data access.

Bugs Bounty

Reward for finding bugs.

Dark Web

Encrypted network not indexed by search engines.

VPN

Virtual Private Network.

Metaverse

Virtual reality space in which users interact.

Web 3.0

Next generation of internet (decentralized).

Protocol

Set of rules for data exchange.

QR Code

Quick Response code.

IoT

Internet of Things.

5G

Fifth generation technology standard for cellular networks.

Peer Review

Evaluation by others in the same field.

Quantum Computing

Computing using quantum states.

Augmented Reality (AR)

Interactive experience of real-world environment.

Virtual Reality (VR)

Simulated experience being completely different from real world.

Edge Computing

Computing near the source of data.

Biotech

Tech based on biology.

Green Tech

Tech that is environmentally friendly.

NLP

Natural Language Processing.

LLM

Large Language Model.

Supervised Learning

Training with labeled data.

Unsupervised Learning

finding patterns in unlabeled data.

Reinforcement Learning

Learning by trial and error.

Computer Vision

Computers understanding images.

Generative AI

AI creating new content.

Virtual Assistant

AI helping with tasks.

Data Warehouse

System for data reporting.

Data Lake

Storage for raw data.

ETL

Extract, Transform, Load.

Public Cloud

Cloud services available to everyone.

Private Cloud

Cloud used by a single org.

Hybrid Cloud

Mix of public and private clouds.

Containerization

Bundling app with dependencies.

SDLC

Software Development Life Cycle.

Waterfall

Linear project management.

XML

Extensible Markup Language.

Version Control

Managing changes to code.

Git

Distributed version control system.

GitHub

Platform for hosting code.

MongoDB

Popular NoSQL database.

PostgreSQL

Advanced open source relational database.

Redis

In-memory data structure store.

HTTP

Hypertext Transfer Protocol.

HTTPS

Secure HTTP.

TCP/IP

Protocols driving the internet.

DNS

Domain Name System.

IP Address

Unique address of a device.

SSH

Secure Shell.

HTML

HyperText Markup Language.

CSS

Cascading Style Sheets.

JavaScript

Language of the web.

TypeScript

JavaScript with syntax for types.

Python

Versatile programming language.

Java

Class-based, object-oriented language.

C++

High-performance language.

Kotlin

Language for Android apps.

Rust

Language focused on safety.

Go

Language by Google.

PHP

Server-side scripting language.

Ruby

Dynamic, open source language.

OS

Operating System.

Kernel

Core of an OS.

Shell

Interface to the kernel.

Terminal

Interface for text commands.

CLI

Command Line Interface.

GUI

Graphical User Interface.

Responsive Design

Design adapting to screen size.

Wireframe

Blueprint of a web page.

Prototype

Early sample of a product.

Refactoring

Restructuring code without changing behavior.

Legacy Code

Old code still in use.

Technical Debt

Cost of choosing easy solution now.

Throughput

Actual data transfer rate.

Load Balancing

Distributing traffic across servers.

Caching

Storing data for faster access.

Session

Period of user interaction.

Local Storage

Storage in browser.

Hardware

Physical parts of computer.

Software

Programs running on hardware.

Firmware

Software embedded in hardware.

CPU

Central Processing Unit.

GPU

Graphics Processing Unit.

RAM

Random Access Memory.

Internet

Global network of computers.

WWW

World Wide Web.

ISP

Internet Service Provider.

Router

Device directing network traffic.

Modem

Device connecting to ISP.

Motherboard

Main circuit board.

SSD

Solid State Drive.

HDD

Hard Disk Drive.

Bluetooth

Short-range wireless tech.

Wi-Fi

Wireless networking.

LTE

Long Term Evolution (4G).

Pixel

Smallest unit of image.

Resolution

Number of pixels on screen.

4K

Resolution approx 4000 pixels wide.

Codec

Device/program to encode data.

Binary

System using 0 and 1.

Hexadecimal

Base-16 number system.

ASCII

Character encoding standard.

Unicode

Standard for text encoding.

Hash Function

Function mapping data to fixed size.

Logic Gate

Building block of digital circuit.

Compilation

Translating code to machine language.

Interpretation

Executing code line by line.

IDE

Integrated Development Environment.

Variable

Container for data value.

Function

Block of code to perform task.

Class

Blueprint for creating objects.

Object

Instance of a class.

Inheritance

Class deriving from another.

Polymorphism

Objects taken on many forms.

Encapsulation

Bundling data and methods.

Loop

Repeating code block.

Conditional

If-then logic.

Integer

Whole number.

Float

Number with decimal point.

String

Sequence of characters.

Array

Collection of items.

Pointer

Variable storing memory address.

Stack

LIFO data structure.

Queue

FIFO data structure.

Tree

Hierarchical data structure.

Graph

Nodes connected by edges.

Hash Table

Key-value store.

Complexity

Efficiency of algorithm.

Big O

Notation for complexity.

Searching

Finding item in data.

Bit

0 or 1.

Byte

Unit of digital information.

Clock Speed

Speed of processor.

BIOS

Basic Input/Output System.

Driver

Software controlling hardware.

Recursion

Function calling itself.

Syntax

Rules of language structure.

Semantics

Meaning of code.

Linker

Program linking object files.

Abstraction

Hiding complex logic.

Concurrency

Dealing with multiple tasks.

Parallelism

Executing tasks simultaneously.

Thread

Unit of execution.

Process

Program in execution.

Deadlock

Processes waiting for each other.

Race Condition

Timing dependent bug.

Mutex

Mutual exclusion object.

Semaphore

Variable controlling access.

Garbage Collection

Automatic memory management.

Reference

Alias for a variable.

Compiler

Translates code to machine lang.

Interpreter

Executes code line by line.

Bytecode

Intermediate code.

Linked List

Linear collection of nodes.

Hash Map

Key-value store.

Binary Tree

Tree with two children max.

Heap

Tree-based structure.

Trie

Prefix tree.

Vector

Dynamic array.

Set

Collection of unique items.

TCP

Transmission Control Protocol.

UDP

User Datagram Protocol.

IP

Internet Protocol.

DHCP

Assigns IP addresses.

FTP

File Transfer Protocol.

SMTP

Protocol for sending email.

IMAP

Protocol for retrieving email.

WebSocket

Two-way communication channel.

SOAP

Protocol for structured info.

OSI Model

7 layers of networking.

RAID

Redundant Array of Independent Disks.

Virtual Machine

Emulated computer.

Hypervisor

Software creating VMs.

Reverse Proxy

Server sitting in front of web servers.

Buffer

Temp storage for data transfer.

AGI

Artificial General Intelligence; human-level AI.

Transformer Model

Architecture used in modern NLP.

Prompt Engineering

Crafting inputs to guide AI responses.

Hallucination (AI)

AI generating false information confidently.

Turing Test

Test of a machine's ability to exhibit intelligent behavior.

Multi-Cloud

Using services from multiple cloud providers.

DDos

Distributed Denial of Service attack.

Man-in-the-Middle

Attacker intercepts communication between two parties.

SQL Injection

Injecting malicious SQL code into queries.

XSS

Cross-Site Scripting attack.

Social Engineering

Manipulating people into divulging info.

Penetration Testing

Simulated cyberattack to find vulnerabilities.

Keylogger

Spyware determining keys pressed on a keyboard.

Botnet

Network of infected computers controlled by attacker.

Trojan

Malware disguised as legitimate software.

Worm

Malware that replicates itself across networks.

Exploit

Code taking advantage of a vulnerability.

Patch Menganement

Process of applying updates to software.

Qubit

Basic unit of quantum information.

Superposition

State of being in multiple states at once.

Entanglement

Quantum correlation between particles.

AR

Augmented Reality; digital overlay on real world.

VR

Virtual Reality; immersive digital environment.

MR

Mixed Reality; interaction between real and digital.

Robotics

Design and construction of robots.

Automation RPA

Robotic Process Automation.

Bioinformatics

Using software to analyze biological data.

Genomics

Study of genomes.

Dark Mode

User interface color scheme.

Hadoop

Framework for distributed storage and processing.

Spark

Engine for large-scale data processing.

Data Scientist

Expert analyzing complex data.

PWA

Progressive Web App; web app behaving like mobile app.

SPA

Single Page Application.

SSR

Server-Side Rendering.

CSR

Client-Side Rendering.

SEO

Search Engine Optimization.

Accessibility

Making web usable by everyone.

DOM

Document Object Model; HTML structure.

RFID

Radio Frequency Identification.

Moore's Law

Observation that computing power doubles every 2 years.

Singularity

Hypothetical point where AI surpasses human intelligence.

Deepfake

AI-generated fake video/audio.

Digital Twin

Virtual replica of a physical object.

Smart City

City using tech to improve services.

Wi-Fi 6

Latest standard for Wi-Fi.

Open Data

Data freely available to everyone.

Dark Data

Data collected but not used.

Algorithm Trading

Trading by algorithms.

Sorting Algorithm

Method to arrange data in order.

Big O Notation

Describing algorithm performance.

Code Review

Peer review of source code.

Design Pattern

Reusable solution to common problems.

MVC

Model-View-Controller architecture.

MVVM

Model-View-ViewModel architecture.

GitLab

DevOps platform with Git.

Jira

Issue tracking tool.

Windows

OS by Microsoft.

macOS

OS by Apple.

Linux

Open-source OS kernel.

Android

Mobile OS by Google.

iOS

Mobile OS by Apple.

Ubuntu

Popular Linux distribution.

Kali Linux

Linux for penetration testing.

Boolean

True or False.

Null

Intentional absence of any object value.

Undefined

Variable declared but not assigned a value.

Exception

Problem occurring during execution.

Bug Tracking

Managing software bugs.

Confluence

Collaboration wiki tool.

Slack

Messaging app for teams.

Zoom

Video conferencing tool.

3D Printing

Manufacturing objects from digital file.

Drone

Unmanned aerial vehicle.

Autonomous Vehicle

Self-driving car.

Smart Home

Home equipped with internet-connected devices.

Wearable Tech

Electronics worn on the body.

Nanotechnology

Manipulation of matter via individual atoms.

Renewable Energy

Energy from natural sources.

Alan Turing

Father of computer science.

Grace Hopper

Pioneer of computer programming.

Bill Gates

Co-founder of Microsoft.

Steve Jobs

Co-founder of Apple.

Elon Musk

CEO of Tesla and SpaceX.

Tim Berners-Lee

Inventor of the World Wide Web.

Linus Torvalds

Creator of Linux and Git.

Google

Tech giant known for search.

Apple

Tech giant known for iPhone.

Microsoft

Software giant behind Windows.

Amazon

E-commerce and cloud giant.

Meta

Parent company of Facebook.

Tesla

Electric vehicle company.

NVIDIA

GPU manufacturer.

Intel

Semiconductor chip manufacturer.

AMD

Semiconductor company rival to Intel.

Samsung

Korean tech conglomerate.

Sony

Japanese tech and entertainment company.

Netflix

Streaming service giant.

Spotify

Music streaming service.

Uber

Ride-hailing platform.

Airbnb

Home-sharing platform.

JPG

Image file format.

PNG

Image format supporting transparency.

GIF

Animated image format.

SVG

Scalable Vector Graphics.

MP3

Audio file format.

MP4

Video file format.

PDF

Portable Document Format.

DOCX

Microsoft Word document.

TXT

Plain text file.

ZIP

Archive file format.

RAR

Archive file format.

EXE

Executable file (Windows).

APK

Android Package Kit.

IPA

iOS App Store Package.

DMG

Disk Image (macOS).

ISO

Disk image of an optical disc.

Bin/Cue

Disc image formats.

Torrent

P2P file sharing protocol.

Magnet Link

Link to download torrent without file.

Seed

Sharing a completed file.

Leech

Downloading without sharing.

Peer

User sharing/downloading files.

Tracker

Server coordinating peers.

Proxy

Server acting as intermediary.

Tor

Network for anonymous communication.

Deep Web

Part of web not indexed by search engines.

Salt

Random data added to hash.

Brute Force

Guessing passwords by trying all combinations.

Rainbow Table

Precomputed table for reversing hashes.

Zero Day

Vulnerability known to hackers but not vendors.

Spyware

Software that spies on user.

Adware

Software showing unwanted ads.

Rootkit

Software enabling unauthorized root access.