Saturday, February 26, 2011

Secure Sockets Layer

  a protocol developed by Netscape for transmitting private documents via the Internet. 

Feed

is a data format used for providing users with frequently updated content.

Directories

graphical user interfaces such as Windows and the Macintosh environment, a folder is an object that can contain multiple documents. 

Copyright


Exclusive rights given to authors and artists to duplicate,
publish, and sell their materials

boolean Logic

is a complete system for logical operations, used often since popularization of mathematical logic and discussions concerning the foundations of mathematics. It was named after George Boole, who first defined an algebraic system of logic in the mid 19th century.


-wikipedia

Blog


Informal Web site consisting of time stamped articles, or
posts, in a diary or journal.

Wiki


Collaborative Web site that allows users to create, add to,modify, or delete the Web site content

webapp

an application that is accessed over a network such as the Internet or an intranet.

Website

A site or a locationb on the World Wide Web. Each Web site contains a home page, which is the first document users see when they enter the site. The site might also contain additional documents and files. 

Web Cache

 Caches retrieved Web pages on the server's hard disk so that the page can be quickly retrieved by the same or a different user the next time that page is requested. 

Web 2.0


Term used to refer to Web sites that provide a means
for users to share personal information, allow users to
modify Web site content.

Uniform Resource Locator

 the global address of documents and other resources on the World Wide Web.

Social Networking Site


Online community where its members to share their interests, ideas, stories, photos,music, and videos with other registered users.

Really Simple Syndication(RSS)


Specification that content aggregators use to distribute
content to subscribers.

Portal


Web site that offers a variety of Internet services from a
single, convenient location.

Podcast


Recorded audio, usually an MP3 file, stored on a Web
site that can be downloaded to a computer or a portable media player such as an iPod.

Mosaic

An application that simplifies accessing documents on the World Wide Web. 

Internet Service Provider (ISP)

this is an regional or national Internet access provider.

Internet Protocol

this is the Internet Public Library.

Hypertext Transfer Protocol


A set of rules that defines how pages transfer on the
Internet.

Hypertext Markup Language


special formatting language that programmers use
to format documents for display on the Web.

Home Page


First page that a Website displays.

Hit


Web page names displayedby a search engine that contain
the search text specified by a user.
Source: discovering computers 2010

Geographic Imaging

  geographical information system, or geospatial information system is any system that captures, stores, analyzes, manages, and presents data that are linked to location. In the simplest terms, GIS is the merging of cartography, statistical analysis, and database technology.


source: wikipedia

File Transfer Protocol (FTP)


an Internet standard that permits file uploading and downloading with other computers on the
Internet.
Source: discovering computers 2010

Domain


Text version of an IP address.
Source: discovering computers 2010

Digital Certificate


A notice that guarantees a user or a Web site
is legitimate.
Source: discovering computers 2010

Cookie


Small text file that a Web server stores on a computer.
Source: Discovering computers 2010

Client


Computer on a network that requests resources from the server.
 source: discovering computers 2010

ActiveX

Similar to an applet, an ActiveX control is a
small program that runs on the client computer,
instead of the server.

Saturday, February 19, 2011

Sources

http://www.webopedia.com/

Worm


Malicious-logic program that copies itself repeatedly,
using up system resources and possibly shutting down the system.

Virus

 Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user’s knowledge or permission.

Urban Legend

Trojan Horse

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

Time Bomb

A malicious program that is programmed to "detonate" at a specific time and release a virus onto the computer system or network.

teleconferencing

 is a telephone or video meeting between participants in two or more locations. 

tagging

Commonly used in blogs, site authors attach keyword descriptions (called tags) to identify images or text within their site as a categories or topic. 

RDF Summary

Short for Resource Description Framework. RDF is a general framework for describing a Web site's metadata, or the information about the information on the site. It provides interoperability between applications that exchange machine-understandable information on the Web.

Phishing

Phishing: where a perpetrator attempts to obtain your personal
and financial information by spoofing.

Netiquette

Netiquette: this is the code of acceptable behavior on the internet.

logic bomb

A program code added to software or an operating system that hides for a period of latency, until that t ime where the code is triggered.

Hoax

Hoax: hoax is a message which is written to deliberately spread fear, uncertainty and doubt.

Fraud

Fraud: this is practice of trickery aimed at gaining unfair advantage.

Filtering

Filtering: this is the separation of unwanted content.

Windows Live Mail

Windows Live Mail: An email client, the successor of Microsoft Outlook.

User Agent

User Agent: this is the term used for a program to access a website.

Text Messaging

 Text Messaging: Also called SMS a service which allows the user to send and receive text messages on mobile devices.

Spam

Spam: unrequested  email messages sent to an recipient.

Signature


Signature: the shape of a person’s handwritten signature or the name of an individual at the foot of an email.