|
Internet Terminology
- World-Wide Web (WWW)
- The "Web" is made up of "Web servers," which are computers that store and disseminate "Web pages" to anyone with an Internet connection. Web pages are interactive documents that contain text, graphics, animations and videos. The pages often contain embedded programs that cause them to function the same as software that users install in their computers. As a result, the Web has enabled the concept of a "global server" that provides a source for all applications as well as data (see Web 2.0).
- HTML
- A Web page is a text document coded with HTML tags that define how the text and graphics are displayed on screen. Web pages can be created with any text editor or word processor. They are also created in HTML authoring programs that provide a graphical interface for designing the layout, and such programs generate the HTML tags behind the scenes. Many applications export documents directly to HTML, thus basic Web pages can be created in numerous ways without HTML coding. The ease of page creation helped fuel the Web's growth.
- Hypertext
- A linkage between related information. Hypertext is the foundation of the World Wide Web, enabling users to click on a link to obtain more information on a subsequent page on the same site or from a Web site anywhere in the world. Hypertext is the umbrella term for all links, whether appearing as text (word, phrase or sentence) or as an icon or other graphical element, the latter technically called a "hypergraphic." The terms "hypertext," "hyperlink" and "link" are also used synonymously. See hypermedia, live link and virtual hypertext.
- Multimedia
- Information in more than one form. It includes the use of text, audio, graphics, animation and full-motion video. Multimedia programs are typically games, encyclopedias and training courses on CD-ROM or DVD. However, any application with sound and/or video can be called a multimedia program. See rich media and multimedia file.
- Domain Name System (DNS)
- (Domain Name System) A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP protocol. For example, when a Web site address is given to the DNS either by typing a URL in a browser or behind the scenes from one application to another, DNS servers return the IP address of the server associated with that name.
In this hypothetical example, WWW.COMPANY.COM would be converted into the IP address 204.0.8.51. Without DNS, you would have to type the four numbers and dots into your browser to retrieve the Web site, which of course, you can do. Try finding the IP of a favorite Web site and type in the dotted number instead of the domain name!
- Internet Access Provider
- (Internet Service Provider) An organization that provides access to the Internet. Connection to the user is provided via dial-up, ISDN, cable, DSL and T1/T3 lines. Customers are generally billed a fixed rate per month, but other charges may apply.
- Dumb Terminal
- A display terminal that provides keyboard input and screen output and no data processing capability. Dumb terminals flourished in the days of minicomputers and mainframes. See smart terminal, 3270 and VT100.
- Wireless Network
- A system that transmits and receives radio signals over the air. The term generally refers to Wi-Fi local area networks (LANs) as well as the optional data services provided by the nationwide cellular carriers (WANs). See Wi-Fi, wireless LAN and cellular generations.
Other Wireless Systems
AM radio, FM radio, satellite radio, satellite TV, satellite Internet access and broadcast TV are also, in fact, wireless networks.
- Modem
- (MOdulator-DEModulator) Until the late 1990s, the term referred to a device that allows a computer or terminal to transmit data over a standard dial-up telephone line. Since the advent of cable and DSL connections, the term may also refer to high-speed broadband modems (see cable modem, DSL and cellular modem).
- FTP
- (File Transfer Protocol) A protocol used to transfer files over a TCP/IP network (Internet, Unix, etc.). For example, after developing the HTML pages for a Web site on a local machine, they are typically uploaded to the Web server using FTP.
FTP includes functions to log in to the network, list directories and copy files. It can also convert between the ASCII and EBCDIC character codes. FTP operations can be performed by typing commands at a command prompt or via an FTP utility running under a graphical interface such as Windows. FTP transfers can also be initiated from within a Web browser by entering the URL preceded with ftp://.
- NFS
- (Network File System) The file sharing protocol in a Unix network. This de facto Unix standard, which is widely known as a "distributed file system," was developed by Sun. The name is somewhat misleading because NFS is not a disk file system that reads and writes the disk sectors, but enables the operating system to view files on computers in the network as if they were local. See file sharing protocol, file system and WebNFS.
- Gopher
- A protocol for searching file names and resources on the Internet that presents hierarchical menus to the user. As users select options, they are moved to different Gopher servers. Where links have been established, Usenet news and other information can be read directly from Gopher.
- Browser
- Web pages are accessed by the user via a Web browser application such as Internet Explorer (IE), Firefox and Safari. The browser renders the pages on screen, executes embedded scripts and invokes additional software as needed. For example, Flash animations and video are rendered by Flash plug-in software that is tailored to each type of Web browser.
- E-mail
- (Electronic-MAIL) The transmission of text messages from sender to recipient. E-mail messages can also be formatted with graphics like a brochure or Web page, an enhancement that many users like, but that creates more spam and a security risk (see HTML e-mail).
Users can send a mail message to a single recipient or to multiple users. In addition, JPEG photos as well as any other type of computer file may be attached to the message (see e-mail attachment). Mail is sent to a simulated mailbox in the organization's mail server until it is downloaded to the "in" mailbox in the user's computer.
- Applet
- A small application, such as a utility program or limited-function spreadsheet or word processor. Java programs that are run from the browser are always known as applets. See midlet, crapplet and Java applet.
- ASCII
- (American Standard Code for Information Interchange) Pronounced "ask-ee," it is the built-in binary code for representing characters in all computers except IBM mainframes, which use the EBCDIC coding system. ASCII was originally developed for communications and uses only seven bits per character, providing 128 combinations that include upper and lower case alphabetic letters, the numeric digits and special symbols such as the $ and %. The first 32 characters are set aside for communications and printer control (see ASCII chart).
- Binary
- Meaning two. The principle behind digital computers. All input to the computer is converted into binary numbers made up of the two digits 0 and 1 (bits). For example, when you press the "A" key on your keyboard, the keyboard circuit generates and transfers the number 01000001 to the computer's memory as a series of pulses with different voltages. The bits are stored as charged and uncharged memory cells or as microscopic magnets on disk and tape. Display screens and printers convert the binary numbers into visual characters.
- Bit
- The computer term "bit" comes from the phrase "Binary DigIT," which is different than that thing you put around a horse's mouth. A bit is a single digit number in base-2 (a zero or a one) and is the smallest unit of computer data. A full page of text is composed of about 16,000 bits.
It is important not to confuse bits with bytes. Both are used to measure amounts of data, but it takes eight bits to make one byte. The most common area where bits are used intstead of bytes is in measuring bandwidth (in bits per second). Why? Probably because it makes your Internet connection sound faster than it really is.
- Byte
- A byte is a set of 8 bits that represent a single character in the computer's memory. Do not confuse this term with "bite," as in taking a bite of a cookie, because that is totally different. While bits are often used to measure data transfer speeds, bytes are used to measure file sizes, hard disk space, and computer memory. Larger amounts of data are measured in units such as megabytes, gigabytes, and terabytes. For example, one kilobyte is equal to 1,024 bytes.
- Client
- In the real world, businesses have clients. In the computer world, servers have clients. The "client-server" architecture is common in both local and wide area networks. For example, if an office has a server that stores the company's database on it, the other computers in the office that can access the datbase are "clients" of the server.
On a larger scale, when you access your e-mail from a mail server on the Internet, your computer acts as the client that connects to the mail server. The term "client software" is used to refer to the software that acts as the interface between the client computer and the server. For example, if you use Microsoft Outlook to check your e-mail, Outlook is your "e-mail client software" that allows you to send and receive messages from the server. Isn't exciting how it all works?
- Cookie
- It seems like everyone who tries to explain what a cookie is just has to make a joke out of it (because of the name), so I'm not even going to bother. In computer terminology, a cookie is data sent to your computer by a Web server that records your actions on a certain Web site. It's a lot like a preference file for a typical computer program. When you visit the site after being sent the cookie, the site will load certain pages according to the information stored in the cookie.
For example, some sites can remember information like your user name and password, so you don't have to re-enter it each time you visit the site. Cookies are what allow you to have personalized web sites like "My Excite" or "My Yahoo," where you can customize what is displayed on the page. While cookies have many benefits, some people don't like to have their information recorded by Web sites that they visit. For this reason, most Web browsers have an option to accept or deny cookies. Personally, I like cookies -- I think they taste great too.
- Cyberspace
- Unlike most computer terms, "cyberspace" does not have a standard, objective definition. Instead, it is used to describe the virtual world of computers. For example, an object in cyberspace refers to a block of data floating around a computer system or network. With the advent of the Internet, cyberspace now extends to the global network of computers. So, after sending an e-mail to your friend, you could say you sent the message to her through cyberspace. However, use this term sparingly, as it is a popular newbie term and is well overused.
- DNS (Domain Name System)
- Stands for "Domain Name System." The primary purpose of DNS is to keep Web surfers sane. Without DNS, we would have to remember the IP address of every site we wanted to visit, instead of just the domain name. Can you imagine having to remember "17.254.3.183" instead of just "apple.com"? While I have some Computer Science friends who might prefer this, most people have an easier time remembering simple names.
The reason the Domain Name System is used is because Web sites are acutally located by their IP addresses. For example, when you type in "http://www.adobe.com," the computer doesn't immediately know that it should look for Adobe's Web site. Instead, it sends a request to the nearest DNS server, which finds the correct IP address for "adobe.com." Your computer then attempts to connect to the server with that IP number. DNS is just another one of the many features of the Internet that we take for granted.
- Domain Name
- This is the name that identifies an Web site. For example, "microsoft.com" is the domain name of Microsoft's Web site. A single Web server can serve Web sites for multiple domain names, but a single domain name can point to only one machine. For example, Apple Computer has Web sites at www.apple.com, www.info.apple.com, and store.apple.com. Each of these sites could be served on different machines.
Then there are domain names that have been registered, but are not connected to a Web server. The most common reason for this is to have e-mail addresses at a certain domain name without having to maintain a Web site. In these cases, the domain name must be connected to a machine that is running a mail server.
- Download
- This is the process in which data is sent to your computer. Whenever you receive information from the Internet, you are downloading it to your computer. For example, you might have to download an upgrade for your computer's operating system in order to play a new game (especially if you're using Windows). Or you might download a demo version of a program you are thinking about buying from the software company's Web site. The opposite of this process, sending information to another computer, is called uploading.
- DSL Fire Wall
- The term "firewall" originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next. They were typically made of brick, steel, or another type of inflammable material that would effectively limit the spread of the fire. In the IT world, firewalls do not involve any fire or pyrotechnics, but they serve a similar purpose. A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall. Most routers can be configured to limit traffic from certain IP addresses or block requests based on other criteria. Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network.
- Flame
- Flaming is the act of posting or sending offensive messages over the Internet. These messages, called "flames," may be posted within online discussion forums or newsgroups, or sent via e-mail or instant messaging programs. The most common area where flaming takes place is online discussion forums, which are also called bulletin boards.
- GIF
- The letters "GIF" actually stand for "Graphics Interchange Format," but you don't need to remember that. What you should know is that a GIF is a compressed image file format. GIF images use a compression formula originally developed by CompuServe (which is why you see the term "CompuServe GIF" in Photoshop, for those of you that care). GIFs are based on indexed colors, which is a palette of at most 256 colors. This helps greatly reduce their file size. These compressed image files can be quickly transmitted over a network or the Internet, which is why you often see them on Web pages. GIF files are great for small icons and animated images, but they lack the color range to be used for high-quality photos.
- Gigabyte
- One billion bytes. Also GB, Gbyte and G-byte.
- Hit
- A successful match. Also known as hits and hit rate.
- Homepage
- The first page retrieved when accessing a Web site or the first screen displayed when a PDA or smartphone is started. It provides the main menu and starting point for the rest of the content on the site or device. See INDEX.HTML and home screen.
- Intranet
- The public Web spawned the private "intranet," an inhouse Web site for employees. Protected via a firewall that lets employees access the Internet, the firewall restricts uninvited users from viewing internal information. There is no difference in hardware and software architecture between a private Web site (intranet) and a public Web site. The difference is who has access.
- Internet
- A gigabyte is 2 to the 30th power, or 1,073,741,824 bytes.
It can be estimated as 10 to the 9th power, or one billion (1,000,000,000) bytes. A gigabyte is 1,024 megabytes and precedes the terabyte unit of measurement. Hard drive sizes are typically measured in gigabytes, such as a 160GB or 250GB drive. The term gigabyte is often often abbreviated as simply a "gig" in speech. For example, if you have a 250GB hard drive, you could say, "I have 250 gigs of disk space." The prefix "giga" comes from the Greek word "gigas," meaning giant.
- Java
- While most of the world uses "Java" as another term for coffee, the computer science world uses it to refer to a programming language developed by Sun Microsystems. The syntax of Java is much like that of C/C++, but it is object-oriented and structured around "classes" instead of functions. Java can also be used for programming applets -- small programs that can be embedded in Web sites. The language is becoming increasingly popular among both Web and software developers since it is efficient and easy-to-use.
Java is a great programming language, but like Reading Rainbow says, you don't have to take my word for it. Sun Micorsystems describes Java as a "simple, object-oriented, distributed, interpreted, robust, secure, architecture-neutral, portable, high-performance, multithreaded, dynamic, buzzword-compliant, general-purpose programming language." And it removes stains like magic.
- LAN
- Stands for "Local Area Network," and is pronounced like "land" without the "d". (Computer people will think you're weird if you pronouce it "L-A-N"). A LAN is a computer network limited to a small area such as an office building, university, or even a residential home. Most mid to large-sized businesses today use LANs, which makes it easy for employees to share information. Currently, the most common type of LANs are Ethernet-based and use software from Novell or Oracle. However, with the emergence of wireless networking, wireless LANs have become a popular alternative.
- Listserv
- This term looks like it's missing an "e", but that's how it's spelled. A listserv, or list server, is a small program that automatically sends messages to multiple e-mail addresses on a mailing list. When someone subscribes to a mailing list, the listserv will automatically add the address and distribute future e-mail messages to that address along with all the others on the list. When someone unsubscribes, the listserv simply removes the address. At least that is the way it supposed to work. Unfortunately, with some SPAM lists, unsubscribing only adds you to more lists.
- Login
- If you are ever asked to enter your username and password, you are being asked to enter your login information. A login is a combination of information that authenticates your identity. This could be a name and password or an ID number and security code. Many secure Web sites use login information to authenticate visitors before allowing them access to certain areas of the site. Unlike the words "brush" and "comb," this term should not be used as both a noun and a verb. It should only be used as a noun, (you don't login to a server, you log in to it).
- Megabyte
- A megabyte is 2 to the 20th power, or 1,048,576 bytes.
It can be estimated as 10 to the 6th power, or one million (1,000,000) bytes. A megabyte is 1,024 kilobytes and precedes the gigabyte unit of measurement. Large computer files are typically measured in megabytes. For example, a high-quality JPEG photo from a 6.3 megapixel digital camera takes up about 3MB of space. A four minute CD-quality audio clip takes up about 40MB of space and CDs can hold up to 700MB of space.
For a list of all the different units of measurements, view this Help Center article.
Abbreviation: MB
- Network
- When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems. The Internet could be described as a global network of networks. Computer networks can be connected through cables, such as Ethernet cables or phone lines, or wirelessly, using wireless networking cards that send and receive data through the air.
- Password
- A password is a string of characters used for authenticating a user on a computer system. For example, you may have an account on your computer that requires you to log in. In order to successfully access your account, you must provide a valid username and password. This combination is often referred to as a login. While usernames are generally public information, passwords are private to each user.
Most passwords are comprised of several characters, which can typically include letters, numbers, and most symbols, but not spaces. While it is good to choose a password that is easy to remember, you should not make it so simple that others can guess it. The most secure passwords use a combination of letters and numbers and don not contain actual words.
- Plugin
- Though software plug-ins might not make your room smell as nice as the scented ones you stick in an outlet, they are still useful. A software plug-in is an add-on for a program that adds functionality to it. For example, a Photoshop plug-in (such as Eye Candy) may add extra filters that you can use to manipulate images. A browser plug-in (such as Macromedia Flash or Apple QuickTime) allows you to play certain multimedia files within your Web browser. VST plug-ins add effects for audio recording and sequencing programs such as Cubase and Logic Audio.
Most graphics and audio programs today support plug-ins since they are a convenient way to expand the capabilities of the program. Though some plug-ins may be shipped with the program, most are developed by third-parties and are sold separately. Because companies that make browser plug-ins are often competing for a standard (such as Flash and QuickTime), these plug-ins are usually available as free downloads from the Internet.
- Protocol
- When computers communicate with each other, there needs to be a common set of rules and instructions that each computer follows. A specific set of communication rules is called a protocol. Because of the many ways computers can communicate with each other, there are many different protocols -- too many for the average person to remember. Some examples of these different protocols include PPP, TCP/IP, SLIP, HTTP, and FTP. Can you guess what the last "P" in each acronym stands for? If you guessed "protocol," send yourself a congratulations e-mail.
- Serch Engine
- Google, Excite, Lycos, AltaVista, Infoseek, and Yahoo are all search engines. They index millions of sites on the Web, so that Web surfers like you and me can easily find Web sites with the information we want. By creating indexes, or large databases of Web sites (based on titles, keywords, and the text in the pages), search engines can locate relevant Web sites when users enter search terms or phrases. When you are looking for something using a search engine, it is a good idea to use words like AND, OR, and NOT to specify your search. Using these boolean operators, you can usually get a list of more relevant sites.
- Spam
- Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board. The unsolicited e-mail messages you receive about refinancing your home, reversing aging, and losing those extra pounds are all considered to be spam. Spamming other people is definitely not cool and is one of the most notorious violations of Internet etiquette (or "netiquette"). So if you ever get the urge to let thousands of people know about that hot new guaranteed way to make money on the Internet, please reconsider.
- Trojan Horse
- In Greek mythology, there is a story about the Trojan War. This war lasted many years, as the Greeks could not penetrate the heavily barricaded city of Troy. So one day, a few of the Greek soldiers brought the people of Troy a large wooden horse, which they accepted as a peace offering. The horse was moved inside the city walls, where it sat until the night. After the people of the city had fallen asleep, Greek soldiers jumped out of the wooden horse, opened the gates to let their fellow soldiers in, and took over the city.
So what is the moral of this story? Mainly, beware of Trojan horses. But how does that relate to computers? That's a good question. In the computing world, Trojan horses are more than just a myth. They really exist and can cause damage to your computer. Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.
For example, a Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data. While this is certainly something you want to avoid, it is good to know that these malicious programs are only dangerous if they are given a chance to run. Also, most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses don't replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers.
So as a general rule, don't open a program unless you know it is legitimate. This applies especially to e-mail attachments that are executable files. Even if you are pretty sure the attachment is OK, it is still a good idea to run it through your virus scan program (with the latest virus definitions) just to be safe. Remember what happened to the people of Troy -- don't let a Trojan horse catch you off guard.
- Upload
- While downloading is receiving a file from another computer, uploading is the exact opposite. It is sending a file from your computer to another system. Pretty straight forward. It is possible to upload and download at the same time, but it may cause slower transfer speeds, especially if you have a low bandwidth connection. Because most files are located on Internet servers, people generally do a lot more downloading than uploading.
- Virus
- Like a biological virus, a computer virus is something you don't want to get. Computer viruses are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. In fact opening an infected e-mail attachment is the most common way to get a virus.
We all know it's hard enough to get a computer to work well when it is healthy, let alone when it has been attacked by a virus. Therefore, it is better to prevent an attack than to try and cure it. There are many anti-virus programs available that scan incoming files for viruses before they can cause damage to your computer. Some of these programs include Norton AntiVirus?, McAfee VirusScan?, and Virex?. It is a good idea to have one of these programs on your computer to prevent a virus attack. It is also important to update your virus definitions file at least once a month so that your anti-virus program can check for all the latest viruses. It's a lot like having a glass of orange juice every morning -- it keeps your computer's immune system strong and healthy.
- Website
- A website, or Web site, is not the same thing as a Web page. Though the two terms are often used interchangeably, they should not be. So what's the difference? To put it simply, a Web site is a collection of Web pages. For example, Amazon.com is a Web site, but there are millions of Web pages that make up the site. Knowing the difference between these two terms can save you a lot of embarrassment.
- Worm
- Worm has two widely different definitions. One refers to a computer virus and the other is an optical storage technology: 1) A type of computer virus
Just like regular worms tunnel through dirt and soil, computer worms tunnel through your computer's memory and hard drive. A computer worm is a type of virus that replicates itself, but does not alter any files on your machine. However, worms can still cause havoc by multiplying so many times that they take up all your computer's available memory or hard disk space. If a worm consumes your memory, your computer will run very slowly and possibly even crash. If the worm affects your hard disk space, your computer will take a long time to access files and you will not be able to save or create new files until the worm has been eradicated.
Worms are hard to detect because they are typically invisible files. They often go unnoticed until your computer begins to slow down or starts having other problems. Unlike viruses and Trojan horses, worms can replicate themselves and travel between systems without any action from the user. For these reasons, it is good to have an antivirus program installed on your system that can detect and remove worms before they have a chance to replicate or spread to other computers. Security updates such as Windows Update also patch security holes that allow worms to infect your computer. So keep your security updates and virus definitions up-to-date and you should be able to keep your computer worm-free.
|
|