Indexed by Doctor Veamoniti Lautaha - PhD. Information Technology Specializing In System Assurance and Security, Co-founder of Tukufonua ma 'a Tonga of the United States of America.
"Malu'i 'ae taufatungamotu'a 'aki 'ae ngeia, totonu, moe molumalu 'oe lea faka-fonua"
'Oku faka'aonga'i 'ae ngahi tuku'anga koloa 'a Tonga ke tokoni ki hono fakatonulea 'ae ngahi lea ko 'eni 'oku ngaue'aki 'ihe lea faka-pilitania pe faka-palangi. Koe ngaahi tuku'anga koloa ko 'eni 'oku kau ki ai 'ae ngahi lea 'o:
1. 'oseni pe ko ngatai.
2. tokanga pe ko 'uta
3. falehanga pe ko ngaue 'ae kakai fefine
4. ngahi kupesi fakafonau
5. ngahi matanga 'oe fonua, pea moe
6. ngahi ta'agna moe faiva.
Leatataki: Lua, 'Utu, Ngalu, Kafa, Feleoko, Okooko, Ope
1. COMPUTER: An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
1. AHUOMA: Ko ha me'a-ngaue fakae'uhila 'oku ngaue'aki ki hono tauhi pea mo faka-hokohoko 'ae ngaahi okooko 'ihe fuo 'oe taha-pea-moe-noa - pe koe "mo'ui pe mate" 'ae 'uhila 'o faka-tatau kiha tu'utu'uni 'a ngaahi me'a kuo tufunga'i makehe mo lahi.
Veteki: (AHU: Ko ha me'a 'oku ngaue malohi mo kikivi; OMA: Ko ha natula 'o ha me'a 'ou fu'u vave 'aupito.)
2. CPU (Central Processing Unit): The "brain" of the computer, responsible for executing instructions.
2. HOKOAONIU (HA): Koe 'atamai 'oe ahuoma 'oku ne fakahokohoko 'ae ngahi tu'utu'uni kuo fa'u.
3. RAM (Random Access Memory): Temporary storage for data the computer is actively using.
3. TAUHI'ANGA MANATU LOLOTONGA (TML): Koe tauhi'anga tu'utu'uni ngaue 'oku lolotonga faka'aonga'i 'e he ahuoma.
4. Hard Drive: Permanent storage for data and programs. A hard drive, also known as a hard disk drive (HDD), is a data storage device that uses magnetic platters to store and retrieve digital information. It's a crucial component in computers and other devices, providing persistent storage for the operating system, applications, and user files.
4. TEKE FEFEKA: Koe feitu'u pau 'oku tauhi ai 'ae ngaahi tala 'ihe fuo faka'uhila pea moe ngaahi me'a kuo tufunga'i makehe mo lahi.
5. Motherboard: The main circuit board connecting all components.
5. PAPAFA'E: Koe tefito'i papa faka-hokongaue 'oku ne faka-fehokotaki 'ae ngahi va'afekau'aki kotoa 'oe ahuoma.
6. Graphics Card: A graphics card, also known as a video card or graphics processing unit (GPU), is a hardware component responsible for rendering and displaying images, videos, and animations on your computer monitor.
6. TUKU'ANGA 'ATA: Koe me'angaue fa'o'anga 'ata, lea, pe faka-tata 'oku ne fatongia'aki 'a hono faka-hokohoko'i 'enau fotu mai, 'asi mai, pea mo honau ngahi fuo moe lanu takitaha 'ihe me'a faka-'ali'ali 'ata.
7. Monitor: The screen that displays information. A monitor is the screen you use to see everything on your computer. It's like a television (TV), but specifically designed to display information from your computer. Without a monitor, you wouldn't be able to see the websites you visit, the documents you create, or the games you play.
7. VAKAI'ANGA: Koe me'angaue faka'ali'ali 'ata, fuo, lanu, mata'itohi, pea moe le'o.
8. Keyboard: Input device for typing text and commands.
8. PAPAPULE: Koe me'angaue fakahu mata'itohi moe ngaahi fakahinohino 'ae ahuoma 'aki hano lomi'i ki nautolu 'ihe papapule.
Veteki: (PAPA: Ko ha feitu'u 'oku toka'angamalie; PULE: Ko ha mafai ki hano tokanga'i ha me'a.)
9. Mouse: Input device for pointing and clicking.
9. PULE: Koe me'angaue talafatongia 'oku faka'aonga'i ki hono tataki mo hono lomi'i 'oe ngaahi fiema'u 'ae ahuoma.
Veteki: (PULE: Koe taha 'oe fingota, pe me'a mo'ui 'oku 'i 'oseni 'oku fotu 'o hange koe {mouse-mausi-kuma}. Koe PULE 'ihe ngahi 'aho ni 'oku 'ikai ke toe 'i ai hano fuefefeka-kafa-uaea). Pe koe pule 'oku fotunga tatau moe makafeke 'a ia 'oku tufunga'i mei ha fo'i pule.
10. Printer: Outputs information onto paper.
10. PAPAPULISI: Ko hono fakafuo mai 'ae ngaahi fakahinohino 'otulea 'ihe tohi'anga.
11. Scanner: Inputs images and documents into the computer.
11. PAPAPAAKI: Ko hono fakahu atu 'ae ngaahi 'ataa pea moe ngaahi tohi'anga fakamatala kihe ahuoma.
12. Modem: Connects the computer to the internet.
12. LUAKAFA: Koe me'angaue 'oku ne fatongia'aki 'a hono fakafehokotaki 'ae ahuoma kihe ngaluope.
Veteki: (LUA: Koe {me'a, feitu'u, naunau, koloa, pe teu} ngahi konga tahi 'oku hou ma'upe; KAFA: Ko ha {me'a, naunau, koloa, pe teu} 'oku lava 'o sio mo ala ki ai 'a ia 'oku faka'aonga'i ki he ha'i, no'o, pe lalava ha toe me'a 'e taha pe lahi ange.)
13. Router: Distributes internet connection to multiple devices.
13. LUAHOKO: Koe me'angaue 'oku ne fatongia'aki 'a hono fakafehokotaki'i 'oe {ope, kupengaope, pe ngaluope} kiha ngahi lukioma 'oku lahi 'aupito 'ihe feitu'u pau.
Veteki: (LUA: Koe {me'a, feitu'u, naunau, koloa, pe teu} ngahi konga tahi 'oku hou ma'upe; HOKO: Ko ha {me'a, naunau, koloa, pe teu} 'oku lava 'o sio mo ala ki ai 'a ia ko hono fatongia koe ha'i pe no'o ha toe me'a 'e taha pe lahi ange.)
14. USB (Universal Serial Bus): Standard port for connecting peripherals.
14. NGALUKAFA: Koe hoko pe konga angamaheni 'ihe ahuoma 'oku faka'aonga'i ki hono fakakau pea fakafehokotaki'i 'oe ngaahi kongokonga tanaki mai 'oe ahuoma.
Veteki: (NGALU: Koe taimi ia 'oku fasi ai 'ae peau 'oe tahi pea koe ngaungau ko ia 'ae tahi 'oku fotunga tatau ia pea moe ngaungaue 'ae peau 'oe 'uhila 'ihe 'ea; KAFA: Ko ha {me'a, naunau, koloa, pe teu} 'oku lava 'o sio mo ala ki ai 'a ia 'oku faka'aonga'i ki he ha'i, no'o, pe lalava ha toe me'a 'e taha pe lahi ange.)
15. Ethernet port: Connects to wired internet.
15. OPEHOKO: Koe feitu'u 'ihe ahuoma 'oku tufunga'i ke hoko ki ai 'ae fue pe kafa 'oe {ope-ngaluope-kupengaope}.
Veteki: (OPE: Koe fakamamani lahi 'ae ivi ngaue 'oe {initaneti, kupengaope, pe ngaluope}; HOKO: Ko ha {me'a, feitu'u, naunau, koloa, pe teu} 'oku lava 'o sio mo ala ki ai 'a ia ko hono fatongia koe ha'i pe no'o ha toe me'a 'e taha pe lahi ange.)
16. Sound card: Processes audio output.
16. TUKU'ANGA ONGO: Koe {me'a-feitu'u-naunau-koloa} 'eni 'oku tufunga'i kene tokanga'i 'ae fakahokohoko 'a hono tuku atu 'ae ongo 'o ha lea pe hiva.
17. Case: The enclosure that houses the computer's components.
17. KOFU: Koe 'uunime'a 'oku ne kofukofu'i 'ae ngaahi kongokonga 'oe ahuoma.
18. Power Supply: Provides electricity to the computer.
18. FONO'UHILA: Koe konga 'oe ahuoma 'oku ne tauhi mo tufaki mei ai 'ae ivi faka'uhila.
18. Cooling Fan: Prevents overheating.
18. II FAKAMOKOMOKO: Koe konga 'oe ahuoma 'oku ne fakamokomoko 'ae ahuoma ke 'oua 'e fu'u mafana.
19. Optical Drive: Reads CDs and DVDs. A piece of hardware that reads and writes data on optical discs like CDs, DVDs, and Blu-ray discs using a laser
19. LAUVAKAI: Koe konga 'oe ahuoma 'oku ne fatongia'aki 'a hono lau mo tohi 'ae okooko kihe ngaahi 'uunimaka kuo tufunga'i ke hoko koe tauhi'anga okooko mo fakamatala 'ae ahuoma.
20. Webcam: Captures video and images.
20. NGALUATA: Ko hono fatongia ko hono hiki 'ae ngaahi 'ata pea moe fotunga.
21. Microphone: Captures audio input.
21. LUAUI: Ko hono fatongai ko hono hiki 'oe ngaahi le'o.
22. Speakers: Output audio.
22. LELEA: Koe {me'a-feitu'u-naunau-koloa} 'eni 'oku tufunga'i kene fakafuo mai 'ae ongo 'o ha lea pe hiva.
23. BIOS (Basic Input/Output System): Firmware that initializes the computer at startup. It is a form of firmware that tells your computer's operating system how to operate properly. It contains instructions on how to control various hardware components such as hard disks, keyboards, and display screens.
23. LAUHOKO: Koe 'uunima'u 'oku ne tataki, fakahinohino, mo kamata'i 'ae hono fakamo'ui 'ae ahuoma.
24. Ports: Physical connections for peripherals.
24. HOKO: Koe feitu'u 'ihe lukioma 'oku tufunga'i ke hoko ki ai 'ae fue pe kafa 'oe ngaahi konga makehe 'oe ahuoma.
Veteki: HOKO: Ko ha {me'a, naunau, koloa, pe teu} 'oku lava 'o sio mo ala ki ai 'a ia ko hono fatongia koe ha'i pe no'o ha toe me'a 'e taha pe lahi ange.
25. Operating System (OS): Manages computer hardware and software.
25. UHONGAUE:
26. Application Software: Programs designed for specific tasks (e.g., word processors, games).
26. NGAFAMOLU:
27. Operating System (OS): Manages computer hardware and software.
27.
28. Browser: Software for accessing the internet.
28. FUEOPE
29. Software: Programs that run on a computer.
29. UNOMOLU
30. File: A collection of data stored under a name.
30. NAUNAU:
31. Folder: Used to organize files.
31. TAKAFI:
32. Program: A set of instructions for the computer to follow.
32. OKOOKO:
33. Code: The instructions that make up a program.
33. 'OTULEA:
34. Algorithm: A set of steps to solve a problem.
34.
35. Compiler: Translates human-readable code into machine code.
35.
36. Interpreter: Executes code line by line.
36.
37. Virus: Malicious software that can damage or steal data.
37. KAHIKAIHA'A:
38. Antivirus: Software to protect against viruses.
38.
39. Firewall: Protects against unauthorized network access.
39. HOLISIAFI:
40. Driver: Software that allows hardware to communicate with the OS.
40. TEKE:
41. Database: Organized collection of data.
41. FELEOKO:
42. Spreadsheet: Software for organizing and analyzing data in rows and columns.
42.
43. Word Processor: Software for creating and editing text documents.
43.
44. Graphic Design Software: Programs for creating visual content.
44.
45. Video Editing Software: Programs for creating and editing videos.
45.
46. Gaming Software: Programs for playing games.
46.
47. Cloud Computing: Using online resources instead of local storage.
47. OPEOMA:
48. Backup: A copy of data for recovery purposes.
48.
49. Encryption: Converting data into a secret code.
49.
50. Data:
50. OKOOKO:
51. Search
51. KUMI & HA'AO
Internet: Global network of interconnected computer networks.
World Wide Web (WWW): A system of linked documents on the internet.
URL (Uniform Resource Locator): A web address.
HTTP (Hypertext Transfer Protocol): Protocol for transferring data on the web.
HTTPS (Hypertext Transfer Protocol Secure): Secure version of HTTP.
IP Address: Unique numerical address of a device on a network.
Domain Name: Human-readable name for a website (e.g., google.com).
DNS (Domain Name System): Translates domain names into IP addresses.
Email: Electronic mail.
Spam: Unsolicited or unwanted email.
KAINAKEHEA: Nofo'i 'eha kakai hala 'ae feitu'u na'e 'ikai totonu ke nau 'i ai.
Phishing: Attempt to steal sensitive information through deceptive emails or websites.
KAHITAUHELE:
Cybersecurity: The practice of protecting systems, networks, and data from cyberattacks.
Information Security: Protecting the confidentiality, integrity, and availability of information.
Access Control: Mechanisms that restrict access to resources.
Authentication: Verifying user identity.
Authorization: Granting access based on identity.
Encryption: Securing data by transforming it into an unreadable format.
Decryption: Restoring encrypted data to its original form.
Hashing: Converting data into a fixed-length value for comparison.
Firewall: A security system that controls network traffic.
Intrusion Detection System (IDS): Monitors network activity for malicious behavior.
Intrusion Prevention System (IPS): Blocks detected threats.
Vulnerability: A weakness that can be exploited by attackers.
Patch: A fix for a software vulnerability.
Zero-day Exploit: Exploiting a vulnerability before a patch is available.
Penetration Testing: Simulating cyberattacks to identify vulnerabilities.
Incident Response: The process of handling security breaches.
Business Continuity Plan: A plan to maintain operations during disruptions.
Risk Management: Identifying and mitigating potential threats.
Compliance: Adhering to regulations and standards.
Data Breach: Unauthorized access to sensitive information.
Malware: Malicious software designed to harm systems.
Virus: Malware that spreads by attaching to other files.
Worm: Malware that replicates itself and spreads across networks.
Trojan Horse: Malware disguised as legitimate software.
Ransomware: Malware that encrypts files and demands a ransom for decryption.
Spyware: Malware that secretly gathers user information.
Adware: Malware that displays unwanted advertisements.
Rootkit: Malware that gains administrator-level access to a system.
Keylogger: Malware that records keystrokes.
Botnet: A network of compromised computers controlled by an attacker.
Fileless Malware: Malware that operates in memory without writing to disk.
Spear Phishing: Targeted phishing attack on specific individuals or organizations.
Whaling: Phishing attacks aimed at high-level executives.
Social Engineering: Manipulating people to reveal information.
Denial-of-Service (DoS): Overwhelming a system with traffic.
Distributed Denial-of-Service (DDoS): DoS attack using multiple compromised systems.
Brute Force Attack: Attempting to guess passwords.
SQL Injection: Exploiting vulnerabilities in database queries.
Cross-Site Scripting (XSS): Injecting malicious scripts into websites.
Man-in-the-Middle (MitM) Attack: Intercepting communication between two parties.
Clickjacking: Deceiving users into clicking on malicious elements.
Deepfake: Falsified media using AI.
Data Breach: Unauthorized access to sensitive data.
Insider Threat: Threat from individuals within an organization.
Advanced Persistent Threat (APT): Prolonged and targeted cyberattacks.
Zero-day Exploit: Exploiting a vulnerability before it's patched.
Cryptojacking: Using a computer without authorization to mine cryptocurrency.
Cyberbullying: Using electronic communication to bully or harass.
Shadow IT: Use of unsanctioned technology within an organization.
Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and act like humans. This includes abilities like learning, reasoning, problem-solving, perception, and language understanding. AI systems achieve this by using algorithms, data, and computational power to perform tasks that typically require human intelligence.
What AI does:
How AI works:
Examples of AI in use:
Your donation will help us to continue our mission of supporting our community. Every dollar counts and will make a difference in the lives of those we serve.
Join our team of volunteers and make a difference in your community. Whether you can give a few hours a week or a few hours a month, your time and skills are appreciated.
We host a variety of events throughout the year, including fundraisers, community outreach events, and educational seminars. Check out our calendar to see what's coming up.
Stay up-to-date on all the latest news and happenings at Tukufonua Ma'a Tonga by following us on social media. We're active on Facebook, Twitter, and Instagram.
To promote transparency by advocating the use of website technology for underserved communities' government entities, businesses, and individuals.
To inspire, empower, and reward learners' dreams for higher education with Need-based and academic scholarships.
To utilize Live interviewing and live streaming to educate seekers of truths and empower people's views and voices.
To utilize Live interviewing and live streaming to restore pride in cultural identity and values through our heritage and create a deeper appreciation for our cultural roots.
To promote greater giving hands of materials to those in need after accepting to follow TMT-USA's guidelines and requirements. For example:
Requirements:
1. One must submit a request form relating to the materials needed.
2. One must appear on the TMT-USA livestream interview to address their request for materials.
3. One must have a governing committee established to administer their program.
To promote greater giving hands of knowledge to those who are need of professional directions, divine inspirations, and firsthand experiences. TMT-USA does this by reaching out to individuals (activists and specialists) in certain areas of movements, beliefs, studies, and trades. Individuals must follow TMT-USA's guidelines and requirements. For example:
Requirements:
1. One must submit a photo of his or her for Livestream interview and talk story.
2. One must submit a brief but concise biography of his or her to go along with the photo.
3. One must comply with the TMT-USA's values, which are 1) Respect, 2) Humility, 3) Loyalty, and 4) Sharing.
To promote greater giving hands of funds to those in need after accepting to follow TMT-USA's guidelines and requirements. For example:
Requirements:
1. One must submit a request form relating to the materials needed.
2. One must appear on the TMT-USA livestream interview to address their request for materials.
3. One must have a governing committee established to administer their program.
Our nonprofit organization is dedicated to improving the lives of those in need. We strive to create positive change in our community through various initiatives and programs. Join us in making a difference today. Currently, we are accepting donations of Chromebooks, Laptops, and school supplies. Please donate.
Join our team of volunteers and make a difference in your community. Whether you can give a few hours a week or a few hours a month, your time and skills are appreciated.
Donated 10 Chromebooks for after school education of grade one to grade six learning about English language.
Your donation will help us to continue our mission of supporting our community.
Donated 2 Chromebooks for after school education.
Help us raise awareness of our mission and programs by sharing our website, social media pages, and events with your friends, family, and colleagues.
Donated 1 Chromebook for a grade one school teacher to use for accessing educational resources from YouTube relevant for learning English.
We're always looking for new partners to collaborate with on projects and events.
Donated 2 Chromebooks to use by high school students when returning back to Falevai Island on the weekend to complete unfinished assignments and homework.
Help us raise awareness of our mission and programs by sharing our website, social media pages, and events with your friends, family, and colleagues.
Donated 1 Chromebook for a grade one school teacher to use for accessing educational resources from YouTube relevant for learning English.
Your donation will help us to continue our mission of supporting our community. Every dollar counts and will make a difference in the lives of those we serve.
Join our team of volunteers and make a difference in your community. Whether you can give a few hours a week or a few hours a month, your time and skills are appreciated.
We host a variety of events throughout the year, including fundraisers, community outreach events, and educational seminars. Check out our calendar to see what's coming up.
Stay up-to-date on all the latest news and happenings at Tukufonua Ma'a Tonga by following us on social media. We're active on Facebook, Twitter, and Instagram.
We're always looking for new partners to collaborate with on projects and events. If your organization shares our values and mission, let's work together to make a positive impact.
Help us raise awareness of our mission and programs by sharing our website, social media pages, and events with your friends, family, and colleagues.
Copyright © 2025 Tukufonua Ma'a Tonga - All Rights Reserved.
Developed by Tonga Web Technology