In computing jargon, the bit bucket is where lost computerized data has gone, by any means; any data which does not end up where it is supposed to, being lost in transmission, a computer crash, or the like, is said to have gone to the bit bucket – that mysterious place on a computer where lost data goes, as in:The errant byte, having failed the parity test, is unceremoniously dumped into the bit bucket, the computer's wastepaper basket.Millions of dollars in time and research data gone into the bit-bucket?

In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements, except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, allowlist, or passlist, in which only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked until an additional step is performed.

Blinkenlights is a neologism for diagnostic lights usually on the front panels on old mainframe computers, minicomputers, many early microcomputers, and modern network hardware. It has been seen as a skeuomorph on many modern office office machines, most notably on photocopiers.

The word "brick", when used in reference to consumer electronics, describes an electronic device such as a mobile device, game console, or router that, due to corrupted firmware, a hardware problem, or other damage, can no longer function, and thus is "bricked". The device becomes as technologically useful as a brick, hence the name.

In computing, a crash, or system crash, occurs when a computer program such as a software application or an operating system stops functioning properly and exits. On some operating systems or individual applications, a crash reporting service will report the crash and any details relating to it, usually to the developer(s) of the application. If the program is a critical part of the operating system, the entire system may crash or hang, often resulting in a kernel panic or fatal system error.

Eating your own dog food or “dogfooding” is the practice of using one's own products or services. This can be a way for an organization to test its products in real-world usage using product management techniques. Hence dogfooding can act as quality control, and eventually a kind of testimonial advertising. Once in the market, dogfooding can demonstrate developers confidence in their own products.

A hashtag is a metadata tag that is prefaced by the hash symbol, #. Hashtags are used on microblogging and photo-sharing services such as Twitter, Instagram and WeChat as a form of user-generated tagging that enables cross-referencing of content; that is, sharing a topic or theme. For example, a search within Instagram for the hashtag #bluesky returns all posts that have been tagged with that hashtag. After the initial hash symbol, a hashtag may include letters, digits, and underscores.

Scratch monkey is a term used in hacker jargon, as in "Before testing or reconfiguring, always mount a scratch monkey", a proverb used to advise caution when dealing with irreplaceable data or devices. It is used to refer to any temporary configuration changes to a computer during any risky operation, which include a replacement for some precious resource or data that might otherwise be destroyed.

Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rather than transmitting it over a computer network. The term, a tongue-in-cheek play on net(work) as in Internet or Ethernet, refers to walking in sneakers as the transport mechanism. Alternative terms may be floppy net, train net, pigeon net, tennis shoe net.

In information systems, a tag is a keyword or term assigned to a piece of information. This kind of metadata helps describe an item and allows it to be found again by browsing or searching. Tags are generally chosen informally and personally by the item's creator or by its viewer, depending on the system, although they may also be chosen from a controlled vocabulary.

A user error is an error made by the human user of a complex system, usually a computer system, in interacting with it. Although the term is sometimes used by human–computer interaction practitioners, the more formal human error term is used in the context of human reliability.

In computer hardware, a white box is a personal computer or server without a well-known brand name. For instance, the term applies to systems assembled by small system integrators and to home-built computer systems assembled by end users from parts purchased separately at retail. In this latter sense, building a white box system is part of the DIY movement. The term is also applied to high volume production of unbranded PCs that began in the mid-1980s with 8 MHz Turbo XT systems selling for just under $1000.