Site hosted by Build your free website today!

Internet Terminology

World-Wide Web (WWW)
The complete set of documents residing on all Internet servers that use the HTTP protocol, accessible to users via a simple point-and-click system.
A markup language used to structure text and multimedia documents and to set up hypertext links between documents, used extensively on the World Wide Web.
A computer-based text retrieval system that enables a user to access particular locations in webpages or other electronic documents by clicking on links within specific webpages or documents.
Computer Science. Of or relating to an application that can combine text, graphics, full-motion video, and sound into an integrated package.
Domain Name System (DNS)
is a hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. Most importantly, it translates domain names meaningful to humans into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. An often used analogy to explain the Domain Name System is that it serves as the "phone book" for the Internet by translating human-friendly computer hostnames into IP addresses. For example, translates to
Internet Access Provider
Internet Service Provider
Dumb Terminal
A terminal that has no internal microprocessor and thus no processing power independent of its host computer.
Wireless Network
A system that transmits and receives radio signals over the air. The term generally refers to Wi-Fi local area networks (LANs) as well as the optional data services provided by the nationwide cellular carriers (WANs). See Wi-Fi, wireless LAN and cellular generations.
A device for transmitting usually digital data over telephone wires by modulating the data into an audio signal to send it and demodulating an audio signal into data to receive it.
A communications protocol governing the transfer of files from one computer to another over a network.
Software from Novell that implements the NFS distributed file system on NetWare servers. It allows Unix and other NFS client machines to access files on a NetWare server
A protocol for the storage and retrieval of text on a computer network using a TCP/IP protocol.
a program used to view HTML documents
A system for sending and receiving messages electronically over a computer network, as between personal computers.
An application that has limited features, requires limited memory resources, and is usually portable between operating systems.
A standard for assigning numerical values to the set of letters in the Roman alphabet and typographic characters.
A computer program in machine language that can be directly executed by the computer.
the basic unit of information in computing and telecommunications; it is the amount of information that can be stored by a device or other physical system that can normally exist in only two distinct states.
In computer technology, a unit of information made up of bits (often eight bits). The memory capacity of a typical personal computer runs from hundreds of thousands to millions of bytes.
A user's computer, which is generally a Windows, Mac or Linux desktop or laptop. The term implies that the client machine is connected to a network. Contrast with server.
A data file written to a hard drive by some Web sites, contains information the site can use to track such things as passwords, login, registration or identification, user preferences, online shopping cart information, and lists of pages visited.
The electronic medium of computer networks, in which online communication takes place.
Domain Name
A series of alphanumeric strings separated by periods, such as, that is an address of a computer network connection and that identifies the owner of the address.
To transfer (data or programs) from a server or host computer to one's own computer or device.
DSL Fire Wall
The primary method for keeping a computer secure from intruders. A firewall allows or blocks traffic into and out of a private network or the user's computer. Firewalls are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network.
To communicate emotionally via e-mail.
(Graphics Interchange Format) A popular bitmapped graphics file format developed by CompuServe. Pronounced "giff" with a hard "g" by most Mac users and "jiff" by PC users, GIFs are widely used on the Web because the format uses its own form of compression.
One billion bytes. Also GB, Gbyte and G-byte
A successful match.
The first page retrieved when accessing a Web site or the first screen displayed when a PDA or smartphone is started
An inhouse Web site on the company's local area network (LAN) that serves employees only, and almost every medium to large company has an intranet.
A large network made up of a number of smaller networks.
An object-oriented programming language that is platform independent. Developed by Sun, Java is widely used on the Web for both client and server processing
(Local Area Network) A communications network that serves users within a confined geographical area. The "clients" are the user's workstations typically running Windows, although Mac and Linux clients are also used.
Mailing list management software from L-Soft international, Inc., Landover, MD ( that runs on Windows, Mac, OpenVMS, VM (mainframe) and various Unix machines.
Signing in and gaining access to a network server, Web server or other computer system.
One million bytes, or more precisely 1,048,576 bytes.
A system that transmits any combination of voice, video and/or data between users. The network includes the network operating system in the client and server machines, the cables connecting them and all supporting hardware in between such as bridges, routers and switches. In wireless systems, antennas and towers are also part of the network.
A secret word or code used to serve as a security measure against unauthorized access to data.
Software that is installed as an add-on to an application in order to enhance its capability
The format and procedure that governs the transmitting and receiving of data.
Search Engine
Software that searches for data based on some criteria. Although search engines have been around for decades, they were brought to the forefront after the Web exploded onto the scene.
E-mail that is not requested. Also known as "unsolicited commercial e-mail". Spam is mostly used to advertise products and sometimes to broadcast some political or social commentary.
Trojan Horse
A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk
To send data from a user's machine to a server
Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.
A presence on the World Wide Web. To qualify as a bona fide Web site, it must be available on the Internet around the clock. A Web site is a collection of Web pages, which are documents coded in HTML that are linked to each other and very often to pages on other Web sites.
A destructive program that replicates itself throughout a single computer or across a network, both wired and wireless. It can do damage by sheer reproduction, consuming internal disk and memory resources within a single computer or by exhausting network bandwidth.