Вы находитесь на странице: 1из 36

Introduction to Internet Terminology

AVI - (Audio Video Interleaved) A Microsoft Corporation multimedia video format. It


uses waveform audio and digital video frames (bitmaps) to compress animation.
Bandwidth - The capacity of an electronic line, such as a communications network or
computer channel, to transmit bits per second (bps).
Bitmap - A representation, consisting of rows and columns of dots, of a graphics
image in computer memory. The value of each dot (whether it is filled in or not) is
stored in one or more bits of data. For simple monochrome images, one bit is sufficient
to represent each dot, but for colors and shades of gray, each dot requires more than
one bit of data. See more graphics formats
Bits and bytes Bit stands for binary digit: 0 or 1
A byte is made up of 8 bits
It takes 1 byte to store one ASCII character ASCII stands for the American
Standard Code for Information Interchange
The combination of bits (which makes up one byte) below represents the
letters below
A
0100 0001
B
0100 0010
C
0100 0011
K stands for kilo and = 1024 (2 to the tenth power)
M stands for mega. A MB, megabyte is about a million bytes (1024x1024)
G stands for giga. A GB, gigabyte is about a billion bytes
(1024x1024x1024)
T stands for tera. A TB, terabyte is about a trillion!
RAM is usually measured in MB
Hard disk spaces is usually measured in gigabytes
Blog - A blog is information that is instantly published to a Web site. Blog scripting
allows someone to automatically post information to a Web site. The information first
goes to a blogger Web site. Then the information is automatically inserted into a
template tailored for your Web site.
Bookmark - a way of storing your favorite sites on the Internet. Browsers like
Netscape or Internet Explorer let you to categorize your bookmarks into folders.
Boolean logic - a type of logic (using AND, OR, NOT operators, for example) used by

search engines to find information on the Internet and in electronic databases. (For
example, to find computer viruses instead of human viruses, you might try the
keywords "computers and viruses.")
Browser - A software program that allows users to access the Internet. Examples:
Nongraphical

a user interface for computers which allows you to read plain text, not
pictures, sound, or video, on the Internet. It is strictly text based, nonWindows, and does not place high memory demands on your
computer. An example is lynx .(http://lynx.browser.org/)
Graphical a user interface for computers which enables people to see color,
graphics, and hear sound and see video, available on Internet sites.
These features are usually designated by underlined text, a change of
color, or other distinguishing feature; sometimes the link is not
obvious, for example, a picture with no designated characteristic.
Examples are Netscape and Internet Explorer.
CGI (Common Gateway Interface script) - a specificiation for transferring information
between a Web server and a CGI program, designed to receive and and return data. The
script can use a variety of languages such as C, Perl, Java, or Visual Basic. Many html
pages that contain forms use a cgi program to process the data submitted by
users/clients.
Chat - real-time, synchronous, text-based communication via computer.
Cookie - Information (in this case URLs, Web addresses) created by a Web server and
stored on a user's computer. This information lets Web sites the user visits to keep of a
user's browsing pattterns and preferences. People can set up their browsers to accept or
not accept cookies.
Cyberculture - "a collection of cultures and cultural products that exist on and/or are
made possible by the Internet, along with the stories told about these cultures and
cultural products." David Silver, "Introducing Cyberculture," Resource Center for
Cyberculture Studies: http://www.com.washington.edu/rccs/ [last
accessed11/24/2001].
Digit - A single character in a numbering system. In decimal, digits are 0 through 9. In
binary, digits are 0 and 1. The os and 1s equate to "on and off functions. Digitization
allows for perfect copying. When text, music, voice and video are in digitized, they can
be electronically manipulated, preserved and regenerated without degredation of
quality at high speed. Each copy of a computer file is exactly the same as the original.
See more comprehensive definitions.
Domain Name - A method of identifying computer addresses. Your e-mail address has
a domain address. If you have an "edu" at the end of your e-mail address that means

your account is affiliated with an educational institution. A "com" extension means you
have a business account. A government account has a .gov suffix.
dpi - (dots per inch) the way the resolution of display and printing is measured.
FAQs - Frequently Asked Questions. A list of questions and answers to explain
products and troubleshoot problems.
Firewall - The name "firewall" derives from the term for a barrier that prevents fires
from spreading. A computer "firewall" is a barrier between your computer and the
outside world. Just like a fire is most likely to
spread through open doors in a building, your computer is most vulnerable at its ports
(the doors). Without ports you could not go on the Internet or let Internet traffic enter
your computer.
An effective software firewall isolates your computer from the Internet using a code
that sets up a blockade to inspect each packet of data, from or to your computer to
determine whether it should be allowed to pass or be blocked.
Firewall software operates in various ways: Packet filters block traffic from IP
addresses and/or port numbers. Proxy servers can break the connection between two
networks. NATs (Network Address Translators) hides the IP addresses of client stations
by presenting one IP address to the "outside" world. Stateful inspection verifies
inbound and outbound traffic to be sure the destination and the source are correct.
Firewall software can allow your computer to operate in stealth mode, so that its IP
address is not visible.
Flash - Animation software used to develop interactive graphics for Web sites as well
as desktop presentations and games (Windows and Mac) by the company Macromedia.
Flash on the Web is displayed by a browser plug-in. Non-Web presentations are run by
a Flash player, included on a floppy or CD-ROM. Flashcan be used to create vectorbased graphics in one or more timelines that provide a sequential path for actions.
FTP - Using file transfer protocol software to receive from upload) or send to
(download) files (text, pictures, spreadsheets, etc.) from one computer/server to
another.
.gif - (graphic interchange format) the usual format for a graphic that is not a photo.
Animated gif files are embedded with coding that creates movement when the graphic
is activated. See more graphics formats
Home page - Generally the first page retrieved when accessing a Web site. Usually a
"home" page acts as the starting point for a user to access information on the site. The
"home" page usually has some type of table of contents for the rest of the site
information or other materials. When creating Web pages, the "home" page has the

filename "index.html," which is the default name. The "index" page automatically
opens up as the "home" page.
HTML - A type of text code in Hypertext Markup Language which, when embedded in
a document, allows that document to be read and distributed across the Internet.
HTTP - The hypertext transfer protocol (http) that enables html documents to be read
on the Internet.
Hypertext - Text that is non-sequential, produced by writing in HTML
(Hypertext Markup Language) language. This HTML coding allows the information
(text, graphics, sound, video) to be accessed using HTTP (Hypertext Transfer
Protocol).
Hyperlink - Text, images, graphics that, when clicked with a mouse (or activated by
keystrokes) will connect the user to a new Web site. The link is usually obvious, such
as underlined text or a "button" of some type, but not always.
Instant Messaging (IM) - a text-based computer conference over the Internet between
two or more people who must be online at the same time. When you send an IM the
receiver is instantly notified that she/he has a message.
Interlaced - A graphics formatting technique that causes an image to gradually appear
on your screen instead of appearing all at once. The image appears blurry at first and is
replaced by successive waves of bit streams that gradually fill in the missing lines until
the image fully appears in full resolution. This gradually rendering of the image is
helpful for Web users who have slow modems and connections, since this technique
allows the viewer to see enough of the image to decide whether or not to continue
loading it. For fast connections, there is no discernible difference.
Internet - A global network of thousands of computer networks linked by data lines
and wireless systems.
[Background history on the Internet -The Internet, originally the ARPAnet
(Advanced Research Projects Agency network), began as a military computer network
in 1969. Other government agencies and universities created internal networks based
on the ARPAnet model. The catalyst for the Internet today was provided by the
National Science Foundation (NSF). Rather than have a physical communications
connection from each institution to a supercomputing center, the NSF began a "chain"
of connections in which institutions would be connected to their "neighbor" computing
centers, which all tied into central supercomputing centers. This beginning expanded to
a global network of computer networks, which allows computers all over the world to
communicate with one another and share information stored at various computer
"servers," either on a local computer or a computer located anywhere in the world. The
Internet is not governed by any official body, but there are organizations which work to

make the Internet more accessible and useful.]


IP Address - (Internet Protocol) The number or name of the computer from which you
send and receive information on the Internet.
JAVA - a computer language, developed by Sun Microsystems, that lets you encode
applications, such as animated objects or computer programs, on the Internet
Javascript - A Web scripting language developed by Netscape. It was developed
independently of the full JAVA language and is an "open" language, free for anyone to
use and adapt. For example, The Java Script Source has many scripts people can adapt
for their own purposes.
.jpg (or jpeg)- (joint photographic expert group) a file format for photographs on Web
pages. The "jpg" format compresses large photo files so they don't take up as many
kilobytes of memory. See more graphics formats
Listserv - An e-mail list of e-mail addresses of people with common interests.
Software enables people who belong to a list to send messages to the group without
typing a series of addresses into the message header. Usually members of the group in
the listserv have to subscribe to the mailing list.
Modem - A device that connects your computer to the Internet, when you are not
connected via a LAN (local area network, such as at work or on a campus.) Most
people connect to a modem when using a home computer. The modem translates
computer signals to analog signals which are sent via phone lines. The telephone
"speaks" to the computer/server which provides your Internet access.
MPEG - (Short for: Moving Picture Experts Group)
MPEG1

Format for compressing video with audio for playback from storage
media with low data transfer rates such as CDROMs or over the
network at
VHS quality.
MPEG- Format for compressing video with audio at broadcast quality
2
resolution for playback in higher data transfer rate environments.
Usually
used for real-time encoding in the professional market, satellite
digital
television (DirecTV, USSB), and for DVDs and other types of video
CDs.
MP3
Format for compressing audio only defined in both MPEG-1 and
MPEG-2. Commonly used for digital music played on personal
MPEG computers (MP3
Layer 3
songs) but also targeted at applications such as digital phones and

new
hardware MP3 players intended as discman or car CD player
replacements.
Multimedia - The Web's integration of audio, video, graphics and text.
Newsgroup - An Internet "site" centered around a specific topic or course. Some
newsreader software can "thread" discussion so there can be various topics centered
around a central theme. An advantage over e-mail is that the messages are archived and
don't reside in your e-mail account, taking up your memory, unless you set up a "sent
mail" or "carbon copy" option. The messages can often be threaded according to a
particular discussion.
PHP - (Hypertext Preprocessor) open source, server-side HTML scripting languaage used
to create dynamic Web pages. PHP is embedded within tags, so the author authorr can
move between HTML and PHP instead of using large amounts of code. Because PHP
is executed on the server, the viewer cannot see the code. PHP can perform the same
tasks as a CGI program can do and is compatible with many different kinds of
databases.
Portal - A Web site "gateway" that provides multiple services, which could include
Web searching capability, news, free-email, discussion groups, online shopping,
references and other services. A more recent trend is to use the same term for sites that
offer services to customers of particular industries, such as a Web-based bank "portal,"
on which customers can access their checking, savings and investment accounts.
RSS - (Rich Site Summary or RDF [Resource Description Framework] Site Summary).
An XML format for sharing content among different Web sites such as news
items. How does it work? A Web site can allow other sites to publish some of its
content by creating an RSS document and registers the document with an RSS
publisher. A web publisher can post a link to the rss feed so users can read the
distributed content on his/her site. Syndicated contentcan can include news feeds,
listings of events, stories, headlines, etc.
Search Engine - specialized software, such as AltaVista and Yahoo, that lets WWW
browser users search for information on the Web by using keywords, phrases, and
boolean logic. Different search engines have different ways of categorizing and
indexing information. Search engines are accessed by typing in the URL of that engine
or using a browser's compilation of search engines in its Internet search function.
Shockwave - A three dimensional (3D) animation technology/format creataed by the
Macromedia company. Macromedia Director producess Shockwave files, which can be
viewed through a Shockwave player, a browser"plug-in" computer program or other
multimedia applications that access the player. Shockwave can be used to create more
sophisticated animations than the Macromedia Flash format. Shockwave uses the .dir
file extension for source files and .dcr extension for Shockwave "movies."

Telnet - The command to log on to another computer on the Internet.


URL - A universal resource locator (a computer address) that identifies the location
and type of resource on the Web. A URL generally starts with "http."
Vector - A line in computer graphics designated by its end points (x-y or x-y-z
coordinates). A vector layer does not use pixels for storing image information. Instead,
it stores a vector object as a set of properties that describe its attributes, dimensions,
and position in the image. Each time an image is opened, these properties are used as
instructions for drawing the objects. Because the objects are independent elements, you
can move them without affecting the rest of the image.
Virtual Community - a term commonly used to describe a group of people who
exchange ideas through computer networks, listservs, newsgroups, and Web-based
bulletin boards. They might not ever meet face-to-face. Generally these people meet
over the long-term, on a regular basis, and share their ideas about a variety of subjects,
depending upon their special interest. The discussions could relate to hobbies, music,
health, self help issues, and professional and scholarly activities.
Virus - a computer program usually hidden in an existing program. Once the existing
program is executed, the virus program is activated and can attach itself to other
programs or files. Viruses can range from benign activities such as attaching a harmless
message to performing malicious activities such as destroying all the data on a
computer hard drive. Viruses are commonly distributed as e-mail attachments which
activate when the attachment is opened. Virus protection software, updated regularly
with the latest virus definitions, can help protect computers from viruses.
Web Bot - A term that applies to programs/applets (macros and intelligent agents) used
on the Internet. Such bots perform a repetitive function, such as posting messages to
multiple newsgroups or doing searches for information.
Wide World Web (WWW) - A hypermedia information storage system which links
computer-based resources around the world. Computer programs called Browsers
enable words or icons called hyperlinks to display, text, video, graphics and sound on a
computer screen. The source of the material is at a different location - a different file in
the same directory, a file in another computer, which can be located anywhere in the
world.
WORM - A destructive computer program that replicates itself throughout your
computer's hard drive and and memory. Worms use up the computers resources and
pull the system down. Worms can be spread in mass-e-mailing if the user opens an
attachment.
(2) A program that moves through a network and deposits information at each node for

diagnostic purposes or causes idle computers to share some of the processing


workload.
XML (Extensible Markup Language) - is a less robust variety of SGML, a system for
organizing and tagging elements of a document so that the document can be
transmitted and interpreted between applications and organizations. Human readable
XML tags defines "what it is," and HTML defines "how it looks." XML allows
designers to create their own tags. For example:
HTML

<font size="2">Jane Doe</font>


<b>March 27, 1975</b>
XML

<firstName>Jane</firstName>
<lastName>Doe</lastName>
<dateBirth>03-27-75</dateBirth>
In the HTML version the tags identify formatting options, such as font size and bold. In
the XML example, the tags identify the content.
Because XML can support business-to-business transactions by making the
transmission and interpretation of data easier, it has the potential to become the
standard for the exchange of data over the Internet.

HTTPS (also called HTTP over TLS,[1][2] HTTP over SSL,[3] and HTTP Secure[4][5]) is
a protocol for secure communication over acomputer network which is widely used on the Internet.
HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection
encrypted by Transport Layer Security or its predecessor, Secure Sockets Layer. The main
motivation for HTTPS is authentication of the visited website and to protect
the privacy and integrity of the exchanged data.
In its popular deployment on the internet, HTTPS provides authentication of the website and
associated web server with which one is communicating, which protects against man-in-the-middle
attacks. Additionally, it provides bidirectional encryption of communications between a client and
server, which protects against eavesdropping and tampering with and/or forging the contents of the
communication.[6] In practice, this provides a reasonable guarantee that one is communicating with
precisely the website that one intended to communicate with (as opposed to an impostor), as well as

ensuring that the contents of communications between the user and site cannot be read or forged by
any third party.
Historically, HTTPS connections were primarily used for payment transactions on the World Wide
Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and
early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of
websites, securing accounts and keeping user communications, identity and web browsing private.

Welcome, readers! As you strive to make sense of the Internet and the World Wide
Web, these 30 terms are bound to be very helpful.

Elisabeth Schmitt/Moment/Getty Images

1. The Web vs. the Internet


The Internet is a vast 'interconnection of computer networks'. It is comprised of millions
of computing devices that trade volumes of information. Desktop computers,
mainframes, GPS units, cell phones, car alarms, video game consoles, and even soda
pop machines are connected to the Net.
The Internet started in the late 1960's as an American military project, and has since
evolved into a massive public spiderweb. No single organization owns or controls the
Internet. The Net has grown into a spectacular mishmash of non-profit, private sector,
government, and entrepreneurial broadcasters.
The Internet houses many layers of information, with each layer dedicated to a different
kind of documentation. These different layers are called 'protocols'. The most popular
protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and
email.

The World Wide Web, or 'Web' for short, is the most popular portion of the Internet. The
Web is viewed through web browser software.
Grammar and spelling note: Use capitalized 'Internet' and 'Web' when using either word
as a noun. Use lowercase 'internet' or 'web' when using either word as an adjective. e.g.
'We were browsing the Internet on our television last night.' e.g. 'We found a really good
web page about global warming.'
Ads
Download a Free Audiobook
mobile.audible.com/Free-Trial
Try Audible with A Free Audiobook. Listen on iOS or Android Devices!
Easy and simple web page
liztid.com
People can't find you, you are new to the web, and want a web page

2. http and https


http is a technical acronym that means 'hypertext transfer protocol', the language of web
pages. When a web page has this prefix, then your links, text, and pictures should work
in your web browser.
https is 'hypertext transfer protocol SECURED'. This means that the web page has a
special layer of encryption added to hide your personal information and passwords.
Whenever you log into your online bank or your web email account, you should see
https at the front of the page address.
:// is the strange expression for 'this is a computer protocol'. We add these 3 characters
in a Web address to denote which set of computer lanaguage rules affect the document
you are viewing.
Read more about http and https here...

3. Browser
A browser is a free software package that lets you view web pages, graphics, and most
online content. Browser software is specifically designed to convert HTML and XML
into readable documents.
The most popular web browsers in 2013 are: Google Chrome, Firefox, Internet Explorer,
and Safari.
Read more about web browsers here...
Ads

Free IT Training
free-online-training-courses.com
Improve Your Computer Skills, Sign Up Now For Free Online Courses
Facebook Account Sign Up
facebook.com
World's Largest Online Community. Join for Free & Enjoy the Benefits!

4. HTML and XML


Hypertext Markup Language is the programmatic language that web pages are based
on. HTML commands your web browser to display text and graphics in orderly fashion.
HTML uses commands called 'HTML tags' that look like the following:

<body></body>

<a href="www.about.com"></a>

<title></title>
XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging
and databasing the text content of a web page. XML commands look like the following:

<entry>

<address>

<city>
XHTML is a combination of HTML and XML.
Read more about HTML here...
Read more about XML here...

5. URL
URL's, or 'uniform resource locators', are the web browser addresses of internet pages
and files. A URL works together with IP addresses to help us name, locate, and
bookmark specific pages and files for our web browsers.
URL's commonly use three parts to address a page or file: the protocol (which is the
portion ending in '//:'); the host computer (which sometimes ends in .com); and the
filename/pagename itself. For example:

https://personal.bankofamerica.com/login/password.htm

http://forums.about.com/ab-guitar/?msg61989.1

ftp://files.microsoft.com/public/eBookreader.msi

telnet://freenet.edmonton.ca/main
Read more about URL's here...
Ads
Meet Foreign Men
www.filipinocupid.com
Foreign Men Seek Filipina Ladies for Dating and Chat. Join Free Now!

6. IP Address
Your computer's 'internet protocol' address is a four-part or eight-part electronic serial
number. An IP address can look something like '202.3.104.55' or like
'21DA:D3:0:2F3B:2AA:FF:FE28:9C5A', complete with dot or colon separators. Every
computer, cell phone, and device that accesses the Internet is assigned at least one IP
address for tracking purposes. Wherever you browse, whenever you send an email or
instant message, and whenever you download a file, your IP address acts like a type of
automobile licence plate to enforce accountability and traceability.
Read more about IP addresses here...
Read more about IP Version 6 addresses here...

7. Email
Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending and
receiving of typewritten messages from one screen to another. Email is usually handled
by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g.
Microsoft Outlook).
Email has many cousins: text messaging, instant messaging, live chat, videomail (vmail),Google Waving.
Read more about email here...

8. Blogs and Blogging


A blog ('web log') is a modern online writer's column. Amateur and professional writers
publish their blogs on most every kind of topic: their hobby interest in paintball and
tennis, their opinions on health care, their commentaries on celebrity gossip, photo
blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can

start a blog, and some people actually make reasonable incomes by selling advertising
on their blog pages.
Web logs are usually arranged chronologically, and with less formality than a full
website. Blogs vary in quality from very amateurish to very professional. It costs nothing
to start your own personal blog.
Read more on web logs here...

9. Social Media and Social Bookmarking


Social media is the broad term for any online tool that enables users to interact with
thousands of other users. Instant messaging and chatting are common forms of social
media, as are blogs with comments, discussion forums, video-sharing and photosharing websites. Facebook.com and MySpace.com are very large social media sites,
as are YouTube.com and Digg.com.
Social bookmarking is a the specific form of social media. Social bookmarking is where
users interact by recommending websites to each other ('tagging sites').
Read more about social media and social bookmarking here

10. ISP
ISP is Internet Service Provider. That is the private company or government
organization that plugs you into the vast Internet around the world. Your ISP will offer
varying services for varying prices: web page access, email, hosting your own web
page, hosting your own blog, and so on. ISP's will also offer various Internet connection
speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).
Today, you will also hear about WISP's, which are Wireless Internet Service Providers.
They cater to laptop users who travel regularly.
Read more on ISP's and WISP's here...

11. Download
Downloading is a broad term that describes when you make a personal copy of
something you find on the Internet or World Wide Web. Commonly, downloading is
associated with songs, music, and software files (e.g. "I want to download a new
musical ringtone for my cell phone", "I want to download a trial copy of Microsoft Office
2010"). The larger the file you are copying, the longer the download will take to transfer

to your computer. Some downloads will take 12 to 15 hours, depending on your Internet
speed.
Be warned: downloading itself is fully legal, as long as you are careful not to download
pirated movies and music.
Ads
Part Time Home job
buildfortune.freshcreator.com/
We have the Easiest Job for you. No Registration Fees.
LottoYard
www.lottoyard.com
LottoYard Lottery Solutions The Leading Online Lottery Platform

12. Malware
Malware is the broad term to describe any malicious software designed by hackers.
Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any
other software that seeks to do one of four things:
1.

vandalize your computer in some way

2.

steal your private information

3.

take remote control of your computer ('zombie' your computer) for other ends

4.

manipulate you into purchasing something


Malware programs are the time bombs and wicked minions of dishonest programmers.
Read more about malware here...

13. Router (aka 'Network Router')


A router, or in many cases, a router-modem combination, is the hardware device that
acts as the traffic cop for network signals into your home. A router can be wired or
wireless or both. Your router provides both a defense against hackers, and the
redirection service of deciding which specific computer or printer should get which
signals in your home. If your router or router-modem is configured correctly, your
Internet speed will be fast, and hackers will be locked out. If your router is poorly
configured, you will experience network sluggishness and possible hacker intrusions.
Read more about network routers here...
Ads

Free IT Training
free-online-training-courses.com
Improve Your Computer Skills, Sign Up Now For Free Online Courses
Satellite Internet
gccsat.com/
GCC's offers high speed internet GCC's provides 24x7 support

14. Keywords and Tags/Labels


Keywords are search terms used to locate documents. Keywords are anywhere from
one to five words long, separated by spaces or commas: e.g. "horseback riding
calgary" e.g. "ipad purchasing advice" e.g. "ebay tips selling". Keywords are the
foundation for cataloging the Web, and the primary means by which you and I will find
anything on the Web.
Tags (sometimes called 'labels') are recommendation keywords. Tags and labels focus
on crosslinking you to related content... they are the modern evolution of 'suggestions
for further reading'.
Read more about keywords and tags/labels here...

15. Texting/Chatting
Texting is the short way to say 'text messaging', the sending of short electronic notes
usually from a cell phone or handheld electronic device. Texting is popular with people
who are mobile and away from their desk computers. Texting is something like the
pagers of old, but has the file attachment ability of email.
To send a text message, you will usually need a keyboard-enabled cellphone and a text
message service through your cellphone provider. You address your text messages
using the recipient's phone number.
In 2010, texting has spawned a controversial habit called 'sexting', which is when young
people send sexual photos of themselves to other cell phone users.
Ads
Download For Free Movies
www.filmfanatic.com
Get Showtimes & Watch Movies Free Download Film Fanatic Today!

16. I.M.

I.M. (usually spelled 'IM' without the periods) is instant messaging, a form of modern
online chatting. IM is somewhat like texting, somewhat like email, and very much like
sending notes in a classroom. IM uses specialized no-cost software that you install on
your computer. That IM software in turn connects you to potentially thousands of other
IM users through the Internet. You locate existing friends and make new friends by
searching for their IM nicknames.
Once the software and your friends list is in place, you can send instantaneous short
messages to each other, with the option of including file attachments and links. While
the recipient sees your message instantly, they can choose to reply at their leisure.
Read more on IM here...

17. P2P
P2P file sharing ('peer-to-peer') is the most voluminous Internet activity today. P2P is
the cooperative trading of files amongst thousands of individual users. P2P participants
install special software on their computers, and then voluntarily share their music,
movies, ebooks, and software files with each other.
Through 'uploading' and 'downloading', users trade files that are anywhere from 1
megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very
controversial because thousands of copyrighted songs and movies trade hands through
P2P.
Read more about the controversial world of P2P file sharing...

18. E-commerce
E-commerce is 'electronic commerce': the transacting of business selling and buying
online. Every day, billions of dollars exchange hands through the Internet and World
Wide Web. Sometimes, the e-commerce is your company buying office products from
another company (business-to-business 'B2B' e-commerce). Sometimes, the eecommerce is when you make a private purchase as a retail customer from an online
vendor (business-to-consumer 'B2C' e-commerce).
E-commerce works because reasonable privacy can be assured through technical
means (e.g. https secure web pages), and because modern business values the
Internet as a transaction medium.

19. Bookmark
A bookmark (aka "favorite") is a marker that you can place on web pages and files. You
would bookmark something because:

1.
2.

You want to return to the page or file later


You want to recommend the page or file to someone else
Bookmarks/Favorites can be made using your right mouse click menu, or the
menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made
on your Mac or Windows computer files.

20. Social Engineering


Social engineering is the conman art of talking directly to people to trick them into
divulging passwords and their private information. All social engineering attacks are
some form of a masquerade or phishing attack, designed to convince you that the
attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might
use an email, phone call, or even face-time interview to deceive you. Common social
engineering attacks include greeting cards, bogus lottery winnings, stock investment
scams, warnings from an alleged banker that you've been hacked, credit card
companies pretending to protect you.

21. Phishing and Whaling


'Phishing' is what modern-day con men do to defraud you of your personal accounts.
Phishing is the use of convincing-looking emails and web pages to lure you into typing
your account numbers and passwords/PINs. Often in the form of fake eBay web pages,
fake PayPal warning messages, and fake bank login screens, phishing attacks can be
very convincing to anyone who is not trained to watch for the subtle clues. As a rule,
smart users distrust any email link that says "you should login and confirm this".
Read more about phishing and whaling here...
Ads
Cloudbric Web Security
www.cloudbric.com
It's easy and simple. It's Free! Start protecting your website today
CCTV Supplier
mec.ph/surveillance
Get reliable surveillance from industry leading distributor.

22. Addons and Plugins


Addons are custom software modifications. User optionally install addons to improve the
power of their Web browsers or office software. Examples include: a custom eBay

toolbar for your Firefox browser, a new search feature for your Outlook email. Most
addons are free, and can be found and downloaded from the Web.
Plugins are a special kind of web browser addon. Plugins are essentially required
addons, if you wish to view very specialized web pages. Examples include: Adobe
Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.
Read more about addons here...
Read more about plugins here...

23. Trojan
A trojan is a special kind of hacker program that relies on the user to welcome it and
activate it. Named after the famous Trojan horse tale, a trojan program masquerades as
a legitimate file or software program. Sometimes it will be an innocent-looking movie
file, or an installer that pretends to be actual anti-hacker software. The power of
the trojan attack comes from users naively downloading and running the trojan file.
Read more about trojan malicious programs here...
Ads
Network Computing Systems
www.lannerinc.com
Customizable, Scalable, Reliable For VPN, UTM, IPS and NGFW
Data Storage Technology
www.holisticdataprotection.com
Don't Leave Your Endpoints at Risk. Free Data Protection Tips.

24. Spamming and Filtering


'Spam' has two meanings. 1) Spam can mean 'the rapid reptition of a keyboard
command'. But more commonly, 2) spam is the jargon name of 'unwanted/unsolicited
email'. Spam email is usually comprised of two sub-categories: high-volume
advertising, and hackers attempting to lure you into divulging your passwords.
Filtering is the popular-but-imperfect defense against spam. Filtering uses software that
reads your incoming email for keyword combinations, andthen either deletes or
quarantines messages that appear to be spam. Look for a 'spam' or 'junk' folder in your
mailbox to see your quarantine of filtered email.
More on spam and filtering here...

25. Cloud Computing and Software-as-aService (SaaS)


Cloud computing is a fancy term to describe that your software is online and 'borrowed',
instead of purchased and actually installed on your computer. Web-based email is the
most prevalent example of cloud computing: the users' email is all stored and accessed
'in the cloud' of the Internet, and not actually on their own computers. This is the modern
version of the 1970's mainframe computing model. As part of the cloud computing
model, 'Software as a Service' is the business model that claims people would rather
rent software than actually own it. With their web browsers, users access the cloud of
the Internet, and log into their online rented copies of their SaaS software.
Read more about cloud computing and SaaS here...
Ads
Mobile Data Encryption
www.lemagit.fr
Open Source for Cloud. Get Tips for Public or Private Clouds Now.

26. Apps and Applets


Apps and applets are small software applications. They are designed to be much
smaller than regular computer software, but still provide very useful functions. Lately,
apps are very popular with cellphone and mobile platforms; specifically: with the Apple
iPhone and theGoogle Android phone.
Examples of apps: rangefinder GPS for golfing, song identification software, restaurant
reviews, pocket video games, language translators for traveling.
Read about popular apps here...

27. Encryption and Authentication


Encryption is the mathematical scrambling of data so that it is hidden from
eavesdroppers. Encryption uses complex math formulas ('ciphers') to turn private data
into meaningless gobbledygook that only trusted readers can unscramble. Encryption is
the basis for how we use the public Internet as a pipeline to conduct trusted business,
like online banking and online credit card purchasing. On the provision that reliable
encryption is in place, your banking information and credit card numbers are kept
private.

Authentication is directly related to encryption. Authentication is the complex way that


computer systems verify that you are who you say you are.
More on encryption and authenticating...

28. Ports and Port Forwarding


'Network ports' are thousands of tiny electronic 'lanes' that comprise your network
connection. Every computer has 65,536 tiny ports, through which Internetworking data
travels in and out. By using port management tools like a hardware router, users can
control port access to better safeguard themselves against hackers.
'Port forwarding' is the semi-complex technique of opening specific network ports. You
would port-forward to speed up your downloading and speed up your online connections
for gaming and teleconferencing.
Read more about ports and port forwarding here...

29. Firewall
Firewall is a generic term to describe 'a barrier against destruction'. It comes from the
building term of a protective wall to prevent the spreading of housefires or engine
compartment fires. In the case of computing, 'firewall' means to have software and/or
hardware protecting you from hackers and viruses.
Computing firewalls range from small antivirus software packages, to very complex and
expensive software + hardware solutions. All the many kinds of computer firewalls offer
some kind of safeguard against hackers vandalizing or taking over your computer
system.
Read more about computer firewalls for personal use...

30. Archives and Archiving


A computer 'archive' is one of two things: a compressed container of multiple smaller
data files, or a purposeful long-term storage of files that are not going to be used often.
In some cases, an archive can be both.
The act of 'archiving', similarly, is one of two things: to combine and squeeze multiple
files into a larger single file (for easier emailing); or, archiving is when you will retire
data and documents to be put into long-term storage (e.g. your thousands of old emails
in your inbox).

Introduction to Internet Terminology


AVI - (Audio Video Interleaved) A Microsoft Corporation multimedia video format. It
uses waveform audio and digital video frames (bitmaps) to compress animation.
Bandwidth - The capacity of an electronic line, such as a communications network or
computer channel, to transmit bits per second (bps).
Bitmap - A representation, consisting of rows and columns of dots, of a graphics
image in computer memory. The value of each dot (whether it is filled in or not) is
stored in one or more bits of data. For simple monochrome images, one bit is sufficient
to represent each dot, but for colors and shades of gray, each dot requires more than
one bit of data. See more graphics formats
Bits and bytes Bit stands for binary digit: 0 or 1
A byte is made up of 8 bits
It takes 1 byte to store one ASCII character ASCII stands for the American
Standard Code for Information Interchange
The combination of bits (which makes up one byte) below represents the

letters below
A
0100 0001
B
0100 0010
C
0100 0011
K stands for kilo and = 1024 (2 to the tenth power)
M stands for mega. A MB, megabyte is about a million bytes (1024x1024)
G stands for giga. A GB, gigabyte is about a billion bytes
(1024x1024x1024)
T stands for tera. A TB, terabyte is about a trillion!
RAM is usually measured in MB
Hard disk spaces is usually measured in gigabytes
Blog - A blog is information that is instantly published to a Web site. Blog scripting
allows someone to automatically post information to a Web site. The information first
goes to a blogger Web site. Then the information is automatically inserted into a
template tailored for your Web site.
Bookmark - a way of storing your favorite sites on the Internet. Browsers like
Netscape or Internet Explorer let you to categorize your bookmarks into folders.
Boolean logic - a type of logic (using AND, OR, NOT operators, for example) used by
search engines to find information on the Internet and in electronic databases. (For
example, to find computer viruses instead of human viruses, you might try the
keywords "computers and viruses.")
Browser - A software program that allows users to access the Internet. Examples:
Nongraphical

a user interface for computers which allows you to read plain text, not
pictures, sound, or video, on the Internet. It is strictly text based, nonWindows, and does not place high memory demands on your
computer. An example is lynx .(http://lynx.browser.org/)
Graphical a user interface for computers which enables people to see color,
graphics, and hear sound and see video, available on Internet sites.
These features are usually designated by underlined text, a change of
color, or other distinguishing feature; sometimes the link is not
obvious, for example, a picture with no designated characteristic.
Examples are Netscape and Internet Explorer.
CGI (Common Gateway Interface script) - a specificiation for transferring information
between a Web server and a CGI program, designed to receive and and return data. The
script can use a variety of languages such as C, Perl, Java, or Visual Basic. Many html
pages that contain forms use a cgi program to process the data submitted by
users/clients.

Chat - real-time, synchronous, text-based communication via computer.


Cookie - Information (in this case URLs, Web addresses) created by a Web server and
stored on a user's computer. This information lets Web sites the user visits to keep of a
user's browsing pattterns and preferences. People can set up their browsers to accept or
not accept cookies.
Cyberculture - "a collection of cultures and cultural products that exist on and/or are
made possible by the Internet, along with the stories told about these cultures and
cultural products." David Silver, "Introducing Cyberculture," Resource Center for
Cyberculture Studies: http://www.com.washington.edu/rccs/ [last
accessed11/24/2001].
Digit - A single character in a numbering system. In decimal, digits are 0 through 9. In
binary, digits are 0 and 1. The os and 1s equate to "on and off functions. Digitization
allows for perfect copying. When text, music, voice and video are in digitized, they can
be electronically manipulated, preserved and regenerated without degredation of
quality at high speed. Each copy of a computer file is exactly the same as the original.
See more comprehensive definitions.
Domain Name - A method of identifying computer addresses. Your e-mail address has
a domain address. If you have an "edu" at the end of your e-mail address that means
your account is affiliated with an educational institution. A "com" extension means you
have a business account. A government account has a .gov suffix.
dpi - (dots per inch) the way the resolution of display and printing is measured.
FAQs - Frequently Asked Questions. A list of questions and answers to explain
products and troubleshoot problems.
Firewall - The name "firewall" derives from the term for a barrier that prevents fires
from spreading. A computer "firewall" is a barrier between your computer and the
outside world. Just like a fire is most likely to
spread through open doors in a building, your computer is most vulnerable at its ports
(the doors). Without ports you could not go on the Internet or let Internet traffic enter
your computer.
An effective software firewall isolates your computer from the Internet using a code
that sets up a blockade to inspect each packet of data, from or to your computer to
determine whether it should be allowed to pass or be blocked.
Firewall software operates in various ways: Packet filters block traffic from IP
addresses and/or port numbers. Proxy servers can break the connection between two
networks. NATs (Network Address Translators) hides the IP addresses of client stations
by presenting one IP address to the "outside" world. Stateful inspection verifies

inbound and outbound traffic to be sure the destination and the source are correct.
Firewall software can allow your computer to operate in stealth mode, so that its IP
address is not visible.
Flash - Animation software used to develop interactive graphics for Web sites as well
as desktop presentations and games (Windows and Mac) by the company Macromedia.
Flash on the Web is displayed by a browser plug-in. Non-Web presentations are run by
a Flash player, included on a floppy or CD-ROM. Flashcan be used to create vectorbased graphics in one or more timelines that provide a sequential path for actions.
FTP - Using file transfer protocol software to receive from upload) or send to
(download) files (text, pictures, spreadsheets, etc.) from one computer/server to
another.
.gif - (graphic interchange format) the usual format for a graphic that is not a photo.
Animated gif files are embedded with coding that creates movement when the graphic
is activated. See more graphics formats
Home page - Generally the first page retrieved when accessing a Web site. Usually a
"home" page acts as the starting point for a user to access information on the site. The
"home" page usually has some type of table of contents for the rest of the site
information or other materials. When creating Web pages, the "home" page has the
filename "index.html," which is the default name. The "index" page automatically
opens up as the "home" page.
HTML - A type of text code in Hypertext Markup Language which, when embedded in
a document, allows that document to be read and distributed across the Internet.
HTTP - The hypertext transfer protocol (http) that enables html documents to be read
on the Internet.
Hypertext - Text that is non-sequential, produced by writing in HTML
(Hypertext Markup Language) language. This HTML coding allows the information
(text, graphics, sound, video) to be accessed using HTTP (Hypertext Transfer
Protocol).
Hyperlink - Text, images, graphics that, when clicked with a mouse (or activated by
keystrokes) will connect the user to a new Web site. The link is usually obvious, such
as underlined text or a "button" of some type, but not always.
Instant Messaging (IM) - a text-based computer conference over the Internet between
two or more people who must be online at the same time. When you send an IM the
receiver is instantly notified that she/he has a message.
Interlaced - A graphics formatting technique that causes an image to gradually appear

on your screen instead of appearing all at once. The image appears blurry at first and is
replaced by successive waves of bit streams that gradually fill in the missing lines until
the image fully appears in full resolution. This gradually rendering of the image is
helpful for Web users who have slow modems and connections, since this technique
allows the viewer to see enough of the image to decide whether or not to continue
loading it. For fast connections, there is no discernible difference.
Internet - A global network of thousands of computer networks linked by data lines
and wireless systems.
[Background history on the Internet -The Internet, originally the ARPAnet
(Advanced Research Projects Agency network), began as a military computer network
in 1969. Other government agencies and universities created internal networks based
on the ARPAnet model. The catalyst for the Internet today was provided by the
National Science Foundation (NSF). Rather than have a physical communications
connection from each institution to a supercomputing center, the NSF began a "chain"
of connections in which institutions would be connected to their "neighbor" computing
centers, which all tied into central supercomputing centers. This beginning expanded to
a global network of computer networks, which allows computers all over the world to
communicate with one another and share information stored at various computer
"servers," either on a local computer or a computer located anywhere in the world. The
Internet is not governed by any official body, but there are organizations which work to
make the Internet more accessible and useful.]
IP Address - (Internet Protocol) The number or name of the computer from which you
send and receive information on the Internet.
JAVA - a computer language, developed by Sun Microsystems, that lets you encode
applications, such as animated objects or computer programs, on the Internet
Javascript - A Web scripting language developed by Netscape. It was developed
independently of the full JAVA language and is an "open" language, free for anyone to
use and adapt. For example, The Java Script Source has many scripts people can adapt
for their own purposes.
.jpg (or jpeg)- (joint photographic expert group) a file format for photographs on Web
pages. The "jpg" format compresses large photo files so they don't take up as many
kilobytes of memory. See more graphics formats
Listserv - An e-mail list of e-mail addresses of people with common interests.
Software enables people who belong to a list to send messages to the group without
typing a series of addresses into the message header. Usually members of the group in
the listserv have to subscribe to the mailing list.
Modem - A device that connects your computer to the Internet, when you are not

connected via a LAN (local area network, such as at work or on a campus.) Most
people connect to a modem when using a home computer. The modem translates
computer signals to analog signals which are sent via phone lines. The telephone
"speaks" to the computer/server which provides your Internet access.
MPEG - (Short for: Moving Picture Experts Group)
MPEG1

Format for compressing video with audio for playback from storage
media with low data transfer rates such as CDROMs or over the
network at
VHS quality.
MPEG- Format for compressing video with audio at broadcast quality
2
resolution for playback in higher data transfer rate environments.
Usually
used for real-time encoding in the professional market, satellite
digital
television (DirecTV, USSB), and for DVDs and other types of video
CDs.
MP3
Format for compressing audio only defined in both MPEG-1 and
MPEG-2. Commonly used for digital music played on personal
MPEG computers (MP3
Layer 3
songs) but also targeted at applications such as digital phones and
new
hardware MP3 players intended as discman or car CD player
replacements.
Multimedia - The Web's integration of audio, video, graphics and text.
Newsgroup - An Internet "site" centered around a specific topic or course. Some
newsreader software can "thread" discussion so there can be various topics centered
around a central theme. An advantage over e-mail is that the messages are archived and
don't reside in your e-mail account, taking up your memory, unless you set up a "sent
mail" or "carbon copy" option. The messages can often be threaded according to a
particular discussion.
PHP - (Hypertext Preprocessor) open source, server-side HTML scripting languaage used
to create dynamic Web pages. PHP is embedded within tags, so the author authorr can
move between HTML and PHP instead of using large amounts of code. Because PHP
is executed on the server, the viewer cannot see the code. PHP can perform the same
tasks as a CGI program can do and is compatible with many different kinds of
databases.
Portal - A Web site "gateway" that provides multiple services, which could include
Web searching capability, news, free-email, discussion groups, online shopping,
references and other services. A more recent trend is to use the same term for sites that

offer services to customers of particular industries, such as a Web-based bank "portal,"


on which customers can access their checking, savings and investment accounts.
RSS - (Rich Site Summary or RDF [Resource Description Framework] Site Summary).
An XML format for sharing content among different Web sites such as news
items. How does it work? A Web site can allow other sites to publish some of its
content by creating an RSS document and registers the document with an RSS
publisher. A web publisher can post a link to the rss feed so users can read the
distributed content on his/her site. Syndicated contentcan can include news feeds,
listings of events, stories, headlines, etc.
Search Engine - specialized software, such as AltaVista and Yahoo, that lets WWW
browser users search for information on the Web by using keywords, phrases, and
boolean logic. Different search engines have different ways of categorizing and
indexing information. Search engines are accessed by typing in the URL of that engine
or using a browser's compilation of search engines in its Internet search function.
Shockwave - A three dimensional (3D) animation technology/format creataed by the
Macromedia company. Macromedia Director producess Shockwave files, which can be
viewed through a Shockwave player, a browser"plug-in" computer program or other
multimedia applications that access the player. Shockwave can be used to create more
sophisticated animations than the Macromedia Flash format. Shockwave uses the .dir
file extension for source files and .dcr extension for Shockwave "movies."
Telnet - The command to log on to another computer on the Internet.
URL - A universal resource locator (a computer address) that identifies the location
and type of resource on the Web. A URL generally starts with "http."
Vector - A line in computer graphics designated by its end points (x-y or x-y-z
coordinates). A vector layer does not use pixels for storing image information. Instead,
it stores a vector object as a set of properties that describe its attributes, dimensions,
and position in the image. Each time an image is opened, these properties are used as
instructions for drawing the objects. Because the objects are independent elements, you
can move them without affecting the rest of the image.
Virtual Community - a term commonly used to describe a group of people who
exchange ideas through computer networks, listservs, newsgroups, and Web-based
bulletin boards. They might not ever meet face-to-face. Generally these people meet
over the long-term, on a regular basis, and share their ideas about a variety of subjects,
depending upon their special interest. The discussions could relate to hobbies, music,
health, self help issues, and professional and scholarly activities.
Virus - a computer program usually hidden in an existing program. Once the existing
program is executed, the virus program is activated and can attach itself to other

programs or files. Viruses can range from benign activities such as attaching a harmless
message to performing malicious activities such as destroying all the data on a
computer hard drive. Viruses are commonly distributed as e-mail attachments which
activate when the attachment is opened. Virus protection software, updated regularly
with the latest virus definitions, can help protect computers from viruses.
Web Bot - A term that applies to programs/applets (macros and intelligent agents) used
on the Internet. Such bots perform a repetitive function, such as posting messages to
multiple newsgroups or doing searches for information.
Wide World Web (WWW) - A hypermedia information storage system which links
computer-based resources around the world. Computer programs called Browsers
enable words or icons called hyperlinks to display, text, video, graphics and sound on a
computer screen. The source of the material is at a different location - a different file in
the same directory, a file in another computer, which can be located anywhere in the
world.
WORM - A destructive computer program that replicates itself throughout your
computer's hard drive and and memory. Worms use up the computers resources and
pull the system down. Worms can be spread in mass-e-mailing if the user opens an
attachment.
(2) A program that moves through a network and deposits information at each node for
diagnostic purposes or causes idle computers to share some of the processing
workload.
XML (Extensible Markup Language) - is a less robust variety of SGML, a system for
organizing and tagging elements of a document so that the document can be
transmitted and interpreted between applications and organizations. Human readable
XML tags defines "what it is," and HTML defines "how it looks." XML allows
designers to create their own tags. For example:
HTML

<font size="2">Jane Doe</font>


<b>March 27, 1975</b>
XML

<firstName>Jane</firstName>
<lastName>Doe</lastName>
<dateBirth>03-27-75</dateBirth>
In the HTML version the tags identify formatting options, such as font size and bold. In
the XML example, the tags identify the content.
Because XML can support business-to-business transactions by making the
transmission and interpretation of data easier, it has the potential to become the

standard for the exchange of data over the Internet.

Glossary of Computer and Internet Terms


File C6-30
Updated November, 2002

pdf format

Iowa State University Extension Communications Systems, 515-294-8658


This file is divided into two section. The first section is a glossary of computer terms, and the second is a glossary of
internet terms.

Computer Terms
Active matrix LCD panel High-resolution color display for laptop computers.
Application software Computer programs designed to directly deal with solving the users problems. Examples
would include programs for accounting, word processing, financial analysis, computer games, etc.
Backup The act of making a second (backup) copy of the data stored on a disk or other storage device, to safeguard
against loss of data if there is damage to the primary copy.
BASIC Acronym for Beginners All-purpose Symbolic Instruction Code. A general-purpose programming language,
often used in computers.
Baud rate A measurement of the speed at which data are transmitted between two computers, the number of signal
per second being transmitted.
Bit Abbreviation for binary digit, the most common unit computers use for representing data internally.
Byte A group of eight bits, the most common unit computers use for internally representing individual characters,
digits, or other data.
Cathode ray tube (CRT) Another term for display screen.
CD-ROM Abbreviation for Compact Disk-Read Only Memory. A small disk device capable of storing extremely large
amounts of data, but which cannot be erased and reused for storing other data (the reason it is referred to as read
only).

Central processing unit (CPU) The part of a computer that controls the entire system and does mathematical
processing of data.
Character A single digit, letter of the alphabet, or other symbol. Usually represented inside a computer by one byte.
Chip Common term for very small silicon wafers upon which electronic circuits have been created for use in
computers. Used for microprocessors, electronic memory, and other internal computer electronic components.
Communications program Computer program containing the instructions that allow a computer to send data to and
receive data from another computer.
CPU Central Processing Unit.
Cursor A block, underline character, arrow, or other symbol used on a display screen to indicate a particular location
on the screen.
Data The symbols, writing, words, or other items used to represent facts, objects, events, or ideas. Accounting
records and yield measurements are two examples of data.
Data base management system (DBMS) General-purpose computer program that allows data to be stored,
manipulated, organized, and retrieved in some logical manner. Sometimes referred to as an electronic filing
program.
Demonstration program Limited, incomplete version of a program offered for sale by a software company, used for
demonstrating the complete programs features and capabilities. Often given free to potential buyers of the complete
program, or sold at low cost.
Disk drive Device for recording onto and reading from one type of computer storage diskeither a diskette, or hard
disk. Varying sizes and types of disks are not interchangeable among disk drives.
Diskette A 3 1/2-inch or 5 1/4-inch floppy disk.
Display screen Usually a television-like screen used for displaying computer output, however, may also be an LCD
or other device.
Documentation The printed operating instructions that accompany a computer or software.
Dot matrix printer Printer that forms characters by selectively coloring or inking dots in a grid or matrix of dots.
Characters thus printed often appear to consist of rows of dots.
Electronic worksheet or spreadsheet A general purpose computer program that operates like a large columnar pad
of paper in the computers memory, which can do calculations on data typed onto the sheet. Allows data and formulas
to be typed in, edited, calculated, and printed out. Often used for budgeting and forecasting, as a what if planning
tool.
Entry The act or result of putting data into a computer.

Ethernet A type of network interface card that connects an individual computer to a network. Computers on the
Internet that use the TCP/IP protocols are frequently connected to the Internet over an Ethernet link.
Expert system A computer program for making a recommendation, which tailors its recommendation to the users
situation by following a variable path of reasoning dependent upon data given it by the user. One example would be a
program to recommend grain marketing strategies based on the users risk and profit goals, availability of storage,
proximity to markets, etc.
FAX modem A device to connect computer to telephone line to send data FAX messages.
File A collection of related data existing upon a computer storage device.
Floppy disk Flexible plastic disk coated with a magnetic material, upon which computer programs and data may be
stored. Usually from 3 to 8 inches in diameter.
Hard disk A type of computer storage disk, usually consisting of a metal platter coated with a magnetic material.
Capable of storing larger amounts of data than floppy disks.
Hardware The physical parts of a computer.
Information The result of processing, manipulating, and organizing data in a way that adds to the knowledge of the
person receiving it.
Ink-jet printer A low-cost, near laser quality printer that uses liquid ink.
Input The data put into a computer.
Keyboard Typewriter-like computer input device.
Kilobyte (K) A unit for measuring computer memory and storage capacity, roughly equal to 1,000 characters or bytes
of data. Technically, one K is 1,024 bytes.
Laser printer A fast, high-quality printer.
LCD Liquid Crystal Display. A technology popular in watches and calculators for displaying information, which also
may be used for computer display screensespecially in portable computers.
LAN Local area network
Megabyte One million bytes, or 1,000 kilobytes.
Memory Term usually referring to the electronic memory circuits of a computer; however, sometimes also extended
to imply all memory and storage devices used by a computer.
Menu A list of choices displayed on a computer display screen, from which the user may choose a program action.
Microcomputer Any computer using a microprocessor as its central processing unit.

Minicomputer Term for computers intermediate in processing power between microcomputers and mainframe
computers.
Modem A device that allows a PC to communicate and exchange information with other modem-equipped computers
via telephone lines. The current standard for modems is 56k, which allows you to transfer data at up to 56,000 bits
per second.
Monitor A display screen.
Mouse Computer input device consisting of a small box having one or more buttons on top, for giving instructions to
a computer.
MSDOS Operating system program popular among users of the IBM-PC and compatible computers.
Operating system A program or collection of programs that coordinates and controls the various devices making up
a computer system.
Output The act or result of printing or displaying information generated by a computer.
PCMCIA An international association that defines specifications for devices.
Peripherals The add-on hardware devices used in conjunction with a computer, printer, display screen, disk drives,
etc.
Printer Device that transfers computer output onto paper.
Program A set of pre-defined commands or instructions that tells a computer how to go about solving a problem or
doing some job.
Random-access memory (RAM) Electronic memory circuits in a computer that may be both read from and written
to, and which lose the data they contain whenever electricity is turned off to the computer. Sometimes referred to as
volatile memory.
Read-only memory (ROM) A memory device (usually electronic memory circuits) that may only be read by a
computer. The data stored in ROM memory is permanent (non-volatile) and is not lost when electricity is turned off to
the computer.
Small computer systems interface (SCSI) Used to connect hard drives and tape drives to computer.
Storage device Any device upon which a computer may store data in permanent form. Data is not lost from a
storage device when the electricity to a computer is turned off, as is the case with electronic memory. Sometimes
called non-volatile memory.
Surge protector Electronic device for protecting a computer or other electronic device from the harmful effects of
sharp surges of voltage in electric power lines.

Template A pre-programmed set of instructions that may be used with an electronic worksheet or spreadsheet
program for doing a particular job. Akin to a computer program.
Utility software Computer programs for handling the organizational and housekeeping chores in running a
computer, such as deleting files of old data, copying disks, printing a directory of the information stored on a disk, etc.
WAN Wide area network
Word processing Using a computer to accept, edit, organize, and print out text.

Internet Terms
Address An individualized name (or number) identifying a computer user or computer. Used in network
communications for the transmission of
messages for a particular person or machine.
Bookmark Most Web browsers give you an option of adding a URL to a list. By doing this, you can store the linking
information (the URL) to any Web pages you plan to revisit.
Browser (Web browser) A software application (either text-based or graphical) that lets you browse (surf) the World
Wide Web.
Cache (Pronounced cash) A region on the computer memory where frequently accessed data can be stored for
fast access.
Chat room (or chatline) A location on an online service that allows users to communicate with each other about an
agreed-upon topic in real time (or
live) as opposed to delayed time with e-mail.
Cookie Small bits of data that a Web page asks a browser to store on a users computer, either in RAM or on the
hard drive.
Dial-up As opposed to a dedicated or leased line; a type of computer linkage using regular telephone lines, generally
referring to the kind of connection one makes when using a terminal emulator and a regular modem.
Domain Name System (DNS) The unique name of a collection of computers connected to networks such as the
Internet.
Download To receive a file sent from another computer via modem.
DSL (Digital Subscriber Line) A DSL circuit is much faster than a regular phone line. Currently DSL is not available
in all cities or parts of cities.
E-mail (electronic mail) Online communications between computer users.
Encryption The process of scrambling a message so that a key, held only by authorized recipients, is needed to
unscramble and read the message.

FAQ Frequently Asked Questions.


File compression This process stores computer data more efficiently so the information takes up less disk or file
space and may be transmitted in less
time.
Finger A program used to find out whether someone is online. It may also reveal his or her full name and project files.
Firewalls Special computers that are set up on a network to prevent intruders from stealing or destroying confidential
files.
Flame To heap written abuse on other computer users or to excessively criticize them for their ideas, spelling,
grammar, etc. Flaming is considered
impolite, juvenile behavior, but it is not uncommon in some newsgroups.
Freeware Noncopyrighted software made available free for public use by the author.
FTP (File Transfer Protocol) The process of transferring files or pro-grams from one computer to another. An FTP
site is a computer on the Internet that stores files and provides access to them.
GIF Graphic Interchange Format, the most common format used for graphics on the Internet.
Helper applications Additional software occasionally needed to help a Web browser program deal with a specialized
file on the Internet.
Home page An introductory WWW page or Web server at a Web site that provides hyperlinks to other Web pages.
HTML (HyperText Markup Language) The computer language used to create hypertext documents. A system of
marking up, or tagging, a document so it can be published on the World Wide Web.
HTTP (HyperText Transfer Protocol) The client-server protocol upon which the World Wide Web is based.
Hyperlink, hypertext A link within one document connected to other documents, other places within the same
document, pictures, or HTML pages. Think of a hyperlink as an invitation to visit another place. A simple click on the
link will take you there.
Internet The worldwide network of networks based on the TCP/IP protocol. A noncommercial, self-governing network
devoted mostly to communication and research with roughly 66 million users worldwide.
Internet Service Providers (ISP) An organization that lets users dial into its computers to connect to its Internet link
for a fee. ISPs generally provide an Internet connection and an electronic mail address. Some providers also include
World Wide Web browsing software.
Intranet Internal networks, based on Internet technology, designed to connect the members of a specific group or
single company (a closed-user group).
IP (Internet Protocol) Main protocol upon which the Internet is based.

ISDN (Integrated Services Digital Network) Telecommunications network that allows for digital voice, video, and
data transmissions.
JPEG (Joint Photographic Experts Group) A format that is used to display graphics on Web pages.
Listserv A program that allows users to mass-distribute messages that form conferences, as well as archiving files
and messages that can be searched for and retrieved.
Login, logon The process of identifying yourself to your computer or an online service. The initial identification
procedure to gain access to a system as a legitimate user. The usual requirements are a valid user name (or user ID)
and password.
Logout, logoff The concluding steps for formally ending a session with a system. Physically disconnecting or
powering down a terminal does not necessarily result in a logout.
Mailing list Electronic discussion groups that link a relatively small group of people together by common interests
and that are distributed throughout the Internet via its global e-mail system.
Multimedia Documents or platforms that combine different kinds of data (text, video, graphics, audio).
Netiquette Guidelines to good manners on the Internet; for example, dont flame other users, dont leave your caps
lock key on (thats like yelling), etc.
Newsgroup Collection of information and users who get together to communicate about one particular subject.
Online Refers to the successful connection with another computer via telephone lines or through a network.
Online service A dial-up service that provides news, information, and discussion forums for users with modemequipped PCs and the access software provided by the service.
PDF (Portable Document Format) A PDF file preserves the look of a document. It is commonly used to make
available publications on the Web. A free Acrobat Reader is needed on a computer before PDF files are readable.
The Reader can be downloaded from the Adobe Corporation web site at www.adobe.com.
Privacy Policy Web sites should have a statement that describes what information about you is collected by the Web
site and how it is used. A good policy statement should have an opt-in or opt-out option. An opt-in option means that
the Web site will not use your information unless you tell them
they can. An opt-out option means that the Web site can use your information.
Protocol The must follow regulations that govern the transmission and receipt of information across a data
communications link.
Script Also known as calling script. A record of keystrokes and commands that can be played back in order to
automate routine tasks, such as logging on to an online service.
Search engine A WWW site that serves as an index to other sites on the Web.

Server A computer (or service) that provides information or a service to other computers on a network.
Shareware Software that is sold by individuals or companies for a nominal fee. Typically the software is downloaded
and tried out before buying and
registering it.
Signature A three- or four-line message, used to identify the sender of an e-mail message or Usenet article.
Spam Generally referred to as the Internet equivalent of junk mail, spam ranges from annoyances like mass emailings and advertisements, junk mail,
and chain letters, to fraudulent product or service promotions, and harassing or threatening e-mails.
T-1, T-3 line High-speed digital lines that provide data communication speeds of 1.544 megabits (T-1) and 45
megabits (T-3) per second.
TCP/IP (Transmission Control Protocol/Internet Protocol) A set of instructions that dictates how packets of
information are sent across multiple
networks. This includes SLIP and PPP. Also included is a built-in error-checking capability.
Telnet A program that lets the user log onto a remote computer. Also, the name of the program implementing the
protocol.
Upload To send or transmit a file from one computer to another via modem.
URL (Universal Resource Locator) A Web sites address. An example is:
http://www.extension.iastate.edu/ (ISU Extensions home page).
Usenet Refers mostly to the newsgroups, but also to e-mail. Usenet travels on the Internet, but also over modems
and satellites.
Username, user-id An address that designates a personal account on a large computer. For example, in
jsmith@xyz.com, jsmith is the user-id.
Virus A piece of programming code inserted into other programming to cause some unexpected and usually
undesirable event, such as deleting or damaging files.
Web server A computer that is connected to the Internet that stores and manages Web documents. A Web server
handles requests from other computers and delivers requested Web documents.
Web site A group of related pages, images, and files on a Web server.
WWW (World Wide Web) One of several features of the Internet. It contains graphics, video, audio, text, and much,
much more.

Вам также может понравиться