Download Glossary of Internet Terms

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Glossary of Internet Terms
block
A setting in Instant Messengers that prevents those you have blocked from seeing when you are online, and keeps
them from being able to message you.
browser
Software that will load and display a web page. The principle browsers are Netscape, Microsoft Internet
Explorer, Opera, and Mosaic.
cache
Browsers such as Netscape and Microsoft Internet Explorer hold copies of recently visited web files, in disk
memory.
chat
A form of real-time electronic communications where participants type what they want to say, and it is repeated
on the screens of all other participants in the same chat. Internet Relay Chat or IRC is an Internet protocol for
chat, and there are many other chat systems in services like Delphi, Yahoo and AOL. Other commonly used
programs are MSN, AIM and ICQ.
cookie
A cookie is a short file put on your computer by a web page which includes information about your usage and
facilitates the current interaction. For example, it may include the information that you have logged into a
passworded area already in the current session and don't need a second password check. There are many uses
for cookies. They may be erased at the end of a session or retained until the next session, and they may be
encrypted or in plain text.
domain name
Domain name addresses, together with IP addresses, are the two forms of Internet addresses in common use.
Domain name addresses all end with a correct top-level domain. The top-level domains may be any of com,
edu, gov, int, ca, net, org, and many more.
download
To transfer a file from another computer to your own computer system via a network.
20
e-mail
Electronic mail. One of the earliest standard Internet protocols which enables people with different computers
and operating systems to communicate with each other. E-mail allows one-to-one or one-to-many mailings.
Mail is received and held by a mail server within an organization or by an Internet service provider until the
addressee logs on to collect the mail.
firewall
Firewall refers to the concept of a security interface or gateway between a closed network and the outside
Internet that blocks or manages communications in and out of the network. The security may be provided by
passwords, authentication techniques, software, and hardware.
flaming
Writing angry or insulting words about a person. It is most often applied to newsgroups and threads, but it
can apply to mailing lists and other forms of public messaging.
FTP
File Transfer Protocol. The Internet protocol that permits you to transfer files between your computer and another
computer.
GIF
Graphical Interchange Format. A bitmap graphical format originally developed for CompuServe that is widely
used in WWW pages. It is particularly good for text art, cartoon art, poster art, and line drawings- -all types
with solid colors and distinct lines or borders between different colors. GIF files use a .gif extension.
hacker
Originally, a hacker was a term of respect among computer designers, programmers, and engineers for those
among them who created truly original and ingenious programs, devices, or sometimes very clever practical
jokes.
Unfortunately, the current popular meaning of the term is to describe those who break into systems, destroy
data, steal copyrighted software, and perform other destructive or illegal acts with computers and networks..
history
List of sites recently visited, saved in the browser.
hit
In search terminology, every listing a search engine returns from a search is called a hit.
home page
A home page is a web page. In most familiar terms, it is a personal page for an individual. It can also be the
basic main page for a more complex web site for individuals, organizations, or web communities. It also refers to
the first page loaded when a browser opens.
HTML
HyperText Markup Language. A coding system used to create WWW pages.
21
http
HyperText Transfer Protocol. It is the main protocol used on the World Wide Web that enables linking to other
web sites. Addressing to other web pages begins with "http://" and is followed by the domain name or IP
address.
hub
A device that connects the cables from computers and other devices such as printers in an ethernet local area
network.
hypertext
A form of text which includes visible links to other pages of text or media, accessible by clicking or selecting
the links.
Instant Messaging
Real-time conversation, similar to chat, but usually person-to-person, rather than in public groups. You must be
invited into the conversation, you cannot just join without permission. Examples are MSN Messenger, ICQ, AIM
as well as features within online games.
IP
Internet Protocol. See TCP/IP
IP address
IP addresses, together with domain addresses are the two forms of Internet addresses in common use. IP
addresses consist of four numbers between 0 and 255, separated by periods. For example, http://102.452.443.43.
IRC
Internet Relay Chat. An Internet protocol that allows people all over the world to meet in conference groups
(called channels) and chat with each other by keying.
ISDN
Integrated Services Digital Network. A technology that carries data over phone.
ISP
Internet Service Provider. Those companies that provide access to the Internet.
JPEG
Joint Photographic Experts Group, a graphical format that is widely used in WWW pages. These files end with .jpg.
link
An active connection to another web page, location in a web page, file, or other Internet resource. Selecting the
link takes you to the new location or resource.
mailbomb
Flood a single e-mail address with a high volume of mail. Used to retaliate against an individual or organization
that has bothered the sender(s) in some way. Please note that the practice violates all Internet Service Provider
user agreements and wastes bandwidth and resources. Its effects go far beyond the annoyance to the addressee.
22
netiquette
Short for net etiquette. The basic principles of courtesy and consideration for others that can keep
communication on the Internet a pleasure for all.
newbie or newby
A newcomer to the nets, who reveals his or her inexperience by lack of knowledge of net conventions,
netiquette, vocabulary, and know-how.
newsgroup
See Usenet Newsgroups
POP
Post Office Protocol. A protocol for client-server e-mail
pop-up
A window that appears without being requested, when you load a particular site. Often they are used for
advertising, and can become an irritant.
portal
A gateway or entrance to the web. In common usage it has come to describe a starting point page with a
hierarchical, topical directory, a search window, and added features like news headlines and stock quotes.
protocol
A standard for the exchange of information. Different computers and operating systems and software are able to
communicate with each other on the Internet, because of the adoption of protocols.
proxy server
A proxy server is a process that acts like a switchboard through a firewall to manage the various types of
permitted communications with the outside world.
router
A router connects networks together, controlling the routing of packets from source to destination and providing
alternate paths when necessary.
search engine
A utility that will search the Internet, a site, or a database for terms that you select.
site
A host on the Internet which allows remote access by such protocols as http, ftp, telnet or gopher. A site may
consist of a single page or many pages under a common site name.
SMTP
Simple Mail Transfer Protocol. The protocol used to send mail between servers and to send mail from your
client to a mail server.
23
social engineering
A cracker term for tricking users of a system to reveal passwords so that the cracker can gain entry to the
system. A common technique is to contact users in chat or e-mail on a system, pretend that they are employees
of the system performing security checks, and insist that the users give their password to prove who they are or
their account will be closed. Such requests are never legitimate! Social engineering schemes can be quite
ingenious and convincing and more subtle than the simple technique above. Never reveal a password or even
give hints what it may be.
spam
Flooding many inappropriate newsgroups or mailing lists or your mailbox with off- topic articles--usually ads
or promotions. It is a major violation of netiquette, and if you try it, it violates your member agreement in most
places and can lead to account cancellation.
surf
To explore the Internet without any more specific a purpose than to see what is out there.
TCP/IP
Transmission Control Protocol/Internet Protocol. The protocols that are the basis for transmitting and routing
data packets on the Internet. The Internet Protocol is the one thing that all current Internet sites have in common
temp files
These files are all the pages and pictures from all the sites you ever visit, which remain on your computers until
you delete your temporary files in you browser.
upload
To transfer a file from your computer system to another system via a network.
urban legend
An oft-told tale on the Internet that is untrue, but refuses to die. They keep reappearing in newsgroups, e-mail
discussion lists, and message bases.
URL
Uniform Resource Locator. URLs specify the location of a resource in the Internet.
Usenet Newsgroups
Usenet Newsgroups are discussion groups about a topic that is reflected in their titles, such as
comp.sys.ibm.pc.games.adventure or sci.astro.hubble. There are eight major primary series of newsgroups:
comp, humanities, misc, news, rec, sci, soc, and talk. Newsgroups in the eight primary series are only created
after a formal approval process, which includes formal discussion and voting.
virus
A destructive program that has the ability to reproduce itself and infect other programs or disks. Typically a
virus will not show itself immediately, but will add itself to programs and disks to spread itself widely on many
computers before it is triggered into its destructive phase. The best defense is to run anti-virus software and use
it on a regular basis. Anti-virus software should be updated monthly.
World Wide Web (WWW)
The World Wide Web is an Internet protocol that makes use of the HTML, hypertext and hypermedia to create
pages with links to other pages. WWW pages can include graphics, audio, and video as well as text.
24