Saturday, February 26, 2011

Secure Sockets Layer

A security technology that is commonly used to secure server to browser transactions.

Feed

Data format used for providing users with frequently updated content.

Directories

A listing of the files stored in memory (usually on a hard disk).

Copyright

A document granting exclusive right to publish and sell literary or musical or artistic work.

Boolean Logic

Use of operators AND, OR, NOT to combine search terms.

Blog

Read, write, or edit a shared on-line journal.

Wiki

A website that allows the easy creation and editing of any number of interlinked web pages.

Webapp

An application that is accessed via a web browser over a network such as the Internet or an intranet.

Website

A computer connected to the internet that maintains a series of web pages on the World Wide Web.

Web Cache

The caching of web documents (HTML pages, images) to reduce bandwidth usage, server load, and perceived lag.

Web 2.0

Web applications that facilitate interactive information sharing, interoperability, user-centered design, and collaboration on the World Wide Web.

Uniform Resource Locator (URL)

The address of a web page on the world wide web.

Social Networking Site

Any of several websites that provide a virtual community in which people with a shared interest may communicate.

Really Simple Syndication (RSS)

Family of web feed formats used to publish frequently updated works.

Portal

A site that the owner positions as an entrance to other sites on the internet.

Podcast

Distribute (multimedia files) over the internet for playback on a mobile device or a personal computer.

Mosaic

Enables seamless taskbar spanning as well as transparent scaling.

Internet Service Provider (ISP)

A company that offers its customers access to the Internet.

Internet Protocol (IP) Address

A usually numerical label assigned to each device (computer, printer) participating in a computer network.

Hypertext Transfer Protocol (HTTP)

To transfer hypertext requests and information between servers and browsers.

Hypertext Markup Language (HTML)

The predominant markup language for web pages.

Home Page

The opening page of a web site.

Hit

The ratio of the number of records found and processed during a particular processing run, to the total number of records available.

Geographic Imaging

Creating a location for maps.

File Transfer Protocol (FTP)

Allows users to copy files between their local system and any system they can reach on the network.

Domain

Used to identify one or more IP addresses.

Digital Certificate

A data file that is issued by a Certification Authority to an individual or organisation to identify them to online services.

Cookie

A short line of text that a web site puts on your computer's hard drive when you access the web site.

Client

Any computer that is hooked up to a computer network.

ActiveX

Software components from Microsoft. They enable sound, Java applets and animations to be integrated in a Web page.

Saturday, February 19, 2011

Worm

A software program capable of reproducing itself that can spread from one computer to the next over a network.

Virus

A harmful or corrupting agency on a computer.

Urban Legend


A story that appears mysteriously and spreads spontaneously in various forms and is usually false.

Trojan Horse

A program that appears desirable but actually contains something harmful.

Time Bomb

A computer program that has been written so that it will stop functioning after a predetermined date or time is reached.

Teleconferencing

A generic term which applies to a variety of technologies and applications, including audio, data and videoconferencing, as well as business TV and distance learning.

Tagging

A non-hierarchical keyword or term assigned to a piece of information (such as an internet bookmark, digital image, or computer file).

RDF Summary

An XML format used to syndicate news, blog posts, forum threads, and other content among different web sites.

Pyramid Schemes

A non-sustainable business model that involves the exchange of money primarily for enrolling other people into the scheme.

Phishing

Deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information.

Netiquette

Conduct while online that is appropriate and courteous to other Internet users.

Logic Bomb

A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

Hoax

A deliberate attempt to deceive or trick people into believing or accepting something false.

Fraud

Something intended to deceive, fake.

Filtering

A computer program to process a data stream.

Windows Mail

An e-mail and newsgroup client included in Windows Vista.

User Agent

A client application implementing a network protocol used in communications within a client-server distributed computing system.

Text Messaging

Exchange of brief written messages between mobile phones over cellular networks.

Spam

Unwanted e-mail (usually of a commercial nature sent out in bulk).

Signature

A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.