Browse Definitions :

Learning Path: Electronics

So that you can give yourself a quick tutorial on electronics, we've arranged our definitions in this Learning Path in a sequence, with more basic building block topics placed at the beginning.

BASIC CONCEPTS... Ohm's Law -atom - electron - voltage - current - impedance - resistance - resistor - direct current (DC) - Kirchhoff's Laws for current and voltage - alternating current (AC) - hertz - frequency - phase - power - true power - apparent power - reactive power - peak - peak-to-peak - root-mean-square (rms) - energy - joule - Btu

FIELDS AND SIGNALS... flux - electrostatic field - dielectric material - magnetic field - electromagnetic field - circuit - signal - polarity - bipolar signaling - unipolar signaling - carrier - antenna - transducer - analog - digital - diode - oscillator

MODULATION... modulation - phase modulation - frequency modulation - phase-shift keying (PSK) - frequency-shift keying (FSK)

WAVELENGTHS... wavelength - signal-to-noise ratio - electromagnetic radiation spectrum - narrowband - broadband - wideband - bandwidth - attenuation - dense wavelength division multiplexing - wavelength switching - wavelength-division multiplexing

NOISE...noise - audio noise - white noise and pink noise

FREQUENCY...frequency - ELF - AF - RF

CONVERSIONS... digital-to-analog conversion - analog-to-digital conversion

TRANSISTORS... transistor -semiconductor - amplifier - bipolar transistor - field-effect transistor - capacitor - inductor

CIRCUITS... circuit - integrated circuit (IC) - CMOS - logic gate - LED - laser diode - optoisolator - surge suppressor - EMI - crosstalk - entropy

ANTENNA TYPES...antenna - feed line - coaxial antenna - dipole antenna - dish antenna - horn antenna - ground-plane antenna - waveguide

View other topics for self-study by visiting our Guide to the Learning Paths.

This was last updated in September 2005



  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...


  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...