Jumat, 16 September 2011

42 Internet terms you should know

The internet is a fast growing part of the 21st century and more and more people are using it. Using it to search for information; using it to book holidays; using it to shop; using it to socialise; using it for business, the list goes on...

The internet is used by millions from all over the globe, so it's surprising to see that a lot of internet users (me included) aren't too familiar with all the internet terms that are commonly used.

So for people out there, who like me, have no idea what people talk about when they're using high-tech web terms (which they find pretty simple), this is a post for you. Or maybe you just want to refresh your memory or clear up some vague ideas.

1. http 

This technical acronym stands for 'hypertext transfer protocol'. Http assigns how messages are to be formatted and transmitted, and what procedures servers and browsers should implement in response to various commands.

There is also a term called a https. This stands for 'hypertext transfer protocol secure', and is a mixture of a http and SSL/TLS to provide a layer of encryption to protect personal information, communication and passwords.

2. SSL 

SSL (secure sockets layer) is a common technological security for providing encrypted links between a web server and browser.

All data that is passed between a web browser and server are private, and so is used by millions of websites around the web.

3. TLS 

TLS which is short for 'transport Layer Security', is a protocol that boasts privacy between client/server applications over the internet.
TLS and SSL are most widely recognised as the protocols for providing secure http (https).

4. Browser  

Browser (web browser) is a software application for retrieving, presenting, viewing and traversing around the web.
It is specifically designed to convert HTML and XML into readable content.

Some examples of web browsers would be; Firefox, internet explorer, safari, google chrome.

5. Server

A network server is a computer designed to process requests and deliver data and information to computers (often referred to as clients) via the internet.

A server computer is a computer, or an arrangement of computers, that link other computers or electronic devices together. The server is sometimes referred to as the host.

6. HTML 

'Hypertext markup language' is the chief markup language that web pages are based upon. It is part of the foundation of your web page and causes your web browser to present graphics and text in an appropriate fashion.

HTML is written in a form of HTML tags enclosed in angle brackets (such as <html>), normally coming in pairs like </hl> and <hl>.

7. XML 

'eXtensible markup language' is a close relative to the HTML and is a set of instructions for encoding documents into machine-readable form.

It is designed to carry data and not to display data into readable form like HTML.
XML tags are not predefined like HTML, but have to be defined by the user.

8. XHTML 

XHTML ('eXtensible hypertext markup language)' is a combination of both HTML and XML. You can read more about XHTML here: XHTML

9. URL 

'Uniform resource locater's' are the browsers internet addresses of web pages and files.

The first part of the address is called the protocol identifier, indicating what protocol to use, and the second part is called the resource name, specifying the domain name or IP address. This helps for searching, naming, locating and bookmarking distinct web pages or files.

10. IRC 

Short for 'internet relay chat', IRC is the structure of real-time internet text messaging.
Mainly designed for group activity as in forums, but also allows one-to-one private massaging.

11. Network  

Computer network, referred to as network is a group of hardware components and computers which are interconnected for the purpose of sharing data and resources.

12. Email 

Email stands for 'electronic mail' and is known as email, is the process of sharing digital messages from an author to a receiver. (Basically a letter but online and with near instant delivery time).  
Some examples of emailing servers are; Hotmail and Yahoo.

13. IP Address 

Your computer and everybody else's computer has an exclusive identifying number called an 'internet protocol' address. It is a four part serial number (each called an octet) and would look something like this: '231.23.19.965'.
The decimals are there to make it easier for us to remember them, but for computers they communicate in binary form.

14. Blog/Blogging 

A blog is a website, or part of one, that is similar to that of a writers column, such as Smart Blog. :)

The blog is usually maintained by the person/people who publishes regular entries, and are popular with amateurs and professionals alike.

What content the blog publishes is entirely up to the author(s), whether it's about sport, technology, a diary, animals, delivering interesting information... the list goes on. A free way to start your own blog is to use a website like the popular Blogger or Wordpress.

15. Trolling 

'Trolling' or a 'troll' is the internet slang to identify a user as posting provocative, off-topic messages in a community online. It is normally done to provoke an emotional response or to disrupt/ruin the topic of discussion.

16. Social Bookmarking 

'Social Bookmarking' is a form of social media, and is where users interact through means of site recommendation. For example: Tweet buttons, facebook like buttons, Digg buttons, StumbleUpon buttons etc.

17. ISP 

Short for 'internet service provider', ISP is a company that provides you with your internet access.
ISP's are based on a monthly fee, varying in price depending on your choice. The service provider will normally provide you with a software package, password & username, and access phone number.

The internet connection speed will also vary depending on your provider.

18. Malware 

Malware, short for 'malicious software', is programming  designed purposely with the intent to disrupt, gather information (including private), gaining unauthorised access to systems, and other behaviour like this.

Malware includes: Trojan Horses; worms; viruses; keyloggers; spyware; zombie software; adware; scareware, and any other malicious program.

19. Router 

A router is a hardware device that forwards data along networks. They can either can be wired, wireless or both.
If your router is configured correctly, hackers will not be able to (or find it a very hard to) hack in, and internet speed will be quick.

20. Keywords 

Keywords are specific words/search terms used to locate information and documents. They are the primary way in which the web can locate a web page/document for you when you search.
It is also an early step into SEO.

21. Tags/Labels 

'Tags' or 'labels', are non-hierarchical term or keyword that is appointed to a piece of information.
An example of some tags/labels can be seen in the right-hand column in the form of a tag cloud.

22. I.M 

I.M, known as 'instant messaging' is a modern way of conversing in real time. Chatrooms have evolved over the years and have increased in sophistication.

23. P2P 

P2P is the quick way to say and write peer-to-peer. It is the trading of files, tasks or workloads between peers.

P2P software can be downloaded, then once done, users can (instead of using the internet), trade files; information; music; ebooks; videos, all voluntarily.

24. E-Commerce 

E-commerce otherwise known as 'electronic commerce', is the trading of business buying and selling online.

Billions of pounds exchange into different hands through the web each day, working because of the reasonable security of web pages. (Https and things like that.)

25. Bookmark 

A bookmark is a locally stored uniform resource identifier, and is a marker you can leave on a web page. Bookmarks are also called favourites internet short-cuts.

You place a bookmark on a page that you would like to come back to. Its the internets version of a bookmark, which is used for reading.

26. RSS 

RSS stands for 'really simple syndication' and is a technology used by millions. RSS allows you to get up-to-date information to read when you have time. It allows you to get information quickly right after it's published.

You are able to read something by RSS by subscribing to the web page, via an RSS subscription link/button.

An example of an RSS subscription button would the one to the right of this blogs URL, or the obvious one in the sidebar, or the link underneath the 'home page' link, at the bottom of this page.

27. Social Engineering 

Social engineering is the practice of manipulation online, for the intent to deceive people into divulging their passwords and private or confidential information. In most of the cases, the attacker doesn't meet the victim face-to-face.

28. Phishing 

Phishing is the attempt of someone or people, to try to get you to hand over your usernames, passwords, or any other personal data.

Posing as a trustworthy source, they send information such as "your bank account has been hacked into, you will need to reconfirm bank details for us to validate your identification. 

This we shorten the process of dealing with the problem".
Phishing is one of many techniques used in social bookmarking.

29. Plugins 

A plugin is range of software products used to specifically view specialised pages. For example adobe flash player, Quicktime etc.

30. Trojan 

The trojan or 'trojan horse' is a type of hacker program. Disguising itself as something useful or desirable to use and install, but with the agenda of stealing information and data. It was named after the trojan horse tale.

31. Spamming 

Spam is the unwanted repetition of a message in an attempt to force the message upon someone who would not normally choose it.

It is commonly done by advertisers for commercial purposes, or it could be hackers trying to find information about you, or it could just be a form of trolling.

32. Filtering 

Filtering is the popular (but not perfect) defence that is used against spam. Filtering uses software to read incoming e-mails, deciding on accordance to keyword combinations whether the e-mail is spam or not. From there it either separates or deletes the e-mail.

33. Cloud Computing 

Cloud computing is used as a service over the internet. Software, shared resources and information are provided to computers and other devices as a use.

A cloud can be public or private. 'Public' is people are able to use the services, whereas 'private' provides hosted services to only a limited number of people.

34. Apps 

An app (also known as 'application software'), is computer software to aid the user to carry out specific tasks.
Examples of these specific tasks could be: accounting software; enterprising software; gaming software; graphic software; and media players etc.

35 Encryption 

Encryption is the method of transforming  information, using algorithms, to make it unreadable to anyone who does not have a 'key' or 'password' to enable decryption.

It is one of the (if not the) best way(s) to achieve data security. Decrypted information is called plain text.

36. Ports 

A port (in computer networking) refers to either a virtual or physical connection points.

Physical ports allow you to connect cables to routers; modems; computers and the like.

Virtual ports allow software applications allow the sharing of hardware resources without the disruption of each other. They are part of IP/TCP networking.

37. Firewall 

Firewall can be implemented in hardware and software, or both, and is designed to restrict unauthorised access to or from a private network, but allowing legitimate communications to pass.

Some techniques firewall may use are: packet filter; application gateway; circuit-level gateway and proxy server.

38. Archives 

Archiving is the process of recording information, enabling individuals to be able to search for what they may want, as all the information in one place. This is the purpose of archives - the storage of information so people can refer back to them if they want.

39. AJAX 

AJAX (also called asynchronous Java Script,) is a group of interrelated web development methods to allow the developer and designer to help solve problems for their customers.

40. CMS 

Short for 'content management system', CMS is a system for supporting a group of procedures used for management, discovery, distribution, and publishing in a coordinated environment. 

41. Domain Name 

A domain name is an individual address that is allocated to individual web addresses, assigning them to a server. The domain name is under the subjection of the rules of the 'domain name system' (DMS).

42. SEO 

SEO stands for 'search engine optimisation' and is the process in which search engines find and access your site, ranking it and basically effecting the ammount of website traffic you could have.

The higher your rank, the higher up on the search engines results page you are.

1 komentar:

  1. Thanks for sharing the Internet terms, I believe they will be useful for young students who just starting their path on the world wide web. A little remark about XHTML - sitechecker.pro/what-is-xhtml/ - it is EXtensible Hypertext Markup Language which introduces stricter rules for creating pages to get closer to the “perfect” code.

    BalasHapus