Selecks's Help Sites

What is What ? ( Glossary )
Friday, 16 May 2002

| Introduction | Glossary | What is Firewall | Secutrity Site | Help Site |


What was it? Peer pressure? Nagging kids? The need to "telecommute"? Those incessant commercials hyping the wonders of the web? It doesn't matter. You broke down and got onto the Internet. Now you feel lost in a sea of obscure geek speak terms and indecipherable acronyms. Have no fear. Everyone experiences this period of discombobulation. Like the new kid in school, you just need to learn the lingo and soon enough you'll be a full-fledged member of the online community. I want to make this transition easier for you. To this end, I've provided the following glossary of Internet-related terms. Some may already be familiar to you, but there are probably a few definitions that will enlighten.

ASCII text
The American Standard Code for Information Interchange is the most common format for text files that are transferred through the Internet. When you download a file from a web site that is composed of alphanumeric characters (letters and numbers), such as a set of instructions, you should be sure that you are transferring it in an ASCII format, rather than
TOP OF PAGE

ActiveX Control
A small program that provides additional features for Web pages or a Web browser. Currently, only Microsoft’s Internet Explorer browser supports ActiveX controls. An ActiveX control is automatically downloaded from a Web site and installed on a computer by Internet Explorer the first time a user visits the page.
TOP OF PAGE

Ad Blocker
Software that stops banner ads from being displayed on Web. Ad Blockers typical make Web pages load faster and prevent ad networks from tracking visits.
TOP OF PAGE

Ad Network
An advertising business that places banner ads, typically on thousands of Web sites. Well-known ad networks include 24/7 Media, Advertising.com, DoubleClick, and Engage.

TOP OF PAGE

Anonymizer
A service that offers anonymous Web surfing by acting as an intermediary. An anonymizer services prevents a Web site from seeing your IP address or planting cookies on your computer.
TOP OF PAGE

Banner Ad
These are the horizontal ads you see at many Web sites. They are typically placed by ad networks and not the site you are visiting. Clicking on a banner ad will take a Web surfer to another site where they can learn more about the product or service being advertised.
TOP OF PAGE

Binary
The two digit ("0" and "1") number system that allows your computer to read and process data. If you are downloading any kind of program or image (any non-text file) from a web site, you must receive it in binary format.
TOP OF PAGE

Booting
Two types of booting are Hard/Warm booting and Soft/cold booting. Booting means loading the operating system so that computer starts managing the resources and become ready to accept, analyse and execute the commands given by the users. While working with PC, user has to load Window98 / WindowMe / Window NT / Window2000 or Window XP .
Hard boot phase starts from switching on computer. After this instructions in ROM get executed. RAM size is checked then Windows system files are loaded into memory.
Soft boot is done, if and when required after hard boot. This does not execute ROM instructions and memory check. This is done by pressing Ctrl, Alt, Del keys simultaneously. It will only refresh the memory and reload the operating system.
TOP OF PAGE

CD-ROM
CD-ROM (Compact Disk Read only Memory). CD drive that can be added to the computer as one of its peripherals. This drive retrieves information from CDs. A storage disk iis like music CD but stores data. CD has 650 MB memory. It is made of plastic material having 4.7" diameter. Bottom surface of CD is aluminium + plastic material with spiral tracks having pitch 0.5 micrometer. CD-R compact disk recordable, CD-RW read write allows to record, erase and rewrite data. This CD can be used for thousand time or less.
TOP OF PAGE

Client/Server
A term that describes the relationship between two computers in which one unit (the client) requests a file or service from another unit (the server). When you visit BradSeleck, your computer (client) requests to see the web pages available on a computer (server).


TOP OF PAGE

Chat
A real-time dialogue between two or more online users conducted in either a public "chat room" or private session in which all exchanges are typed in and appear on the screen. May be referred to as "Internet Relay Chat" or IRC for short.
TOP OF PAGE

Cookie
A small text file which is deposited on your hard drive by a web site you visit. This file identifies your computer. It records your preferences and other data about your visit to that site. When you return to the site, the site knows who you are. Cookies can thus be used for longer term data collection.
TOP OF PAGE

Cookie, 3rd Party
These cookies are placed by ad networks and Internet marketing companies, not the site you are visiting.
TOP OF PAGE

Cookie Buster
Software to block or remove cookies to stop tracking by Web sites and ad networks.
TOP OF PAGE

CPU and it Speed
The heart of a computer (your PC) is a Central Processing Unit (CPU). The CPU incorporates an ALU, a control unit and registers. It is mainly CPU that decides the speed and power of a computer.
The base of CPU  is a silicon chip. The chip houses millions of transistors that do the basic logical and arithmetic functions in a prescribed sequence. A fast CPU takes less time to complete a task. The speed of CPU usually refers to clock speed. There is a clock on your computer CPU and uses a quartz crystal. This crystal produce million of pulses per second. The clock speed measured in (MHz & GHz) supplies the CPU with electrical pulses that synchronizes the instruction the CPU sends to other devices such as ROM, RAM. The CPU can execute an instruction from software. Intel & AMD microprocessor with 2GHz refers to clock speed of 2 GHz
TOP OF PAGE

Cyber
A prefix used to describe some element of the high-tech or information age. Examples include cyberspace, cybersex, and cybercitizen.
TOP OF PAGE

Data Spill
A data spill occurs when information entered into a form at a Web site is accidentally sent to Web servers of other companies. These companies can be ad networks or advertisers. Data spills are caused by poor design of forms at a Web site.
TOP OF PAGE

Daemon
Pronounced "demon", a program that runs independently from the operating system and handles routine processes in the background of network transactions.
TOP OF PAGE

Dial up services
Dial up service means that you dial up your ISP through standard telephone lines. You establish a connection with an ISP computer system (and to the internet). For dial up service you need a modem and a dial up software such as the dial up networking in windows 95/98, 2000 , WIndow XP and a telephone connection.
TOP OF PAGE

Digital Certificate
A digital stamp, using encryption technology that certifies where a digital document came from. A certification authority backs up the certificates.
TOP OF PAGE

Download
The process of retrieving a file from a remote computer. The file is copied from the Internet server to your computer, where you can view it and use it. Your computer "downloaded" this glossary web page to your computer so that you could read it.
TOP OF PAGE

DSL
Digital Subscriber Line is modem technology that transforms ordinary telephone line also known as "twisted copper pairs" with high speed digital lines for Instant Internet Access. This technology is promoting high data communications and interactive Video. DSL is the next best choise if cable connection is not available. The DSL modems are a digital coding technique to get tremendous capacity out of your existing phone lines without interfering with regular services. There is no need for any additional dial up and you can talk on your phone or send a fax at the same time while you are surfing the web. DSL is often compared to ISDN. DSL provides speed up to 8 Mbps. These speeds are almost 200 times faster than 28.8 K modems.
TOP OF PAGE

Dynamic IP-Address
A dynamic IP address is one that changes everytime you go online. Dial-up accounts get a new IP address everytime one dials up.
TOP OF PAGE

E-business
Also known as "e-commerce", this term describes any commercial transactions conducted over the web (buying and selling of goods or services).
TOP OF PAGE

E-mail
Shortened form of electronic mail, describes the transmission of messages over a public or private network. The majority of traffic over the Internet is in the form of e-mail.
TOP OF PAGE

Encryption Software
Encryption technology permits digital information to be scrambled to make it unreadable by those who do not have a complete set of digital keys.
TOP OF PAGE

Ethernet Adaptor Address
This is the personal name of the ethernet card in one's computer. Ethernet is a commonly use networking technology, used to link computers together.
TOP OF PAGE

Fair Information Practices
The Code of Fair Information Practices is based on five principles:
1. There must be no personal data record-keeping systems whose very existence is secret.
2. There must be a way for a person to find out what information about the person is in a record and how it is used.
3. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent.
4. There must be a way for a person to correct or amend a record of identifiable information about the person.
5. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data.
(U.S. Dep't. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data
Systems, Records, computers, and the Rights of Citizens viii (1973))
TOP OF PAGE

Firewall
A software or hardware device to control access to computer on a Local Area Network (LAN) from outside computers on the Internet.
TOP OF PAGE

FAQ
Frequently-Asked Questions is usually a file or web page dedicated to answering the basic questions about any topic covered on the Internet. New users are strongly encouraged to read through the FAQ section whenever one is made available to you. It can often save you time and confusion when visiting a new site or trying a new Internet-based service.
TOP OF PAGE

Flaming
The practice of electronically abusing another person online through newsgroups, e-mail or chat forums. Flaming is frowned upon and a breach of netiquette.
TOP OF PAGE

Floppy Disk
A flat piece of rotating circular magnetic material. A device that magnetically stores information from computer system on to a diskette. In hard disk the disks are not flexible. In a floppy disks the disk is a circular plate made of flexible magnetic coated plastic sheet. These floppies need floppy disk drive. There are two types of disk drive and disks. 3½" drive and 5¼" drive. Floppy of 3½" have 1.44 MB and 5¼" drive uses 1.2 MB memory. Old computers work with both types of disks. At present 3½" are most used. But after CD-ROM drive, floppy drive use has become less.
TOP OF PAGE

Form
Any element of a web page that requires a user to enter information to get output from a web server. When you use one of a search engine to find information on the web, you are using a form.
TOP OF PAGE

Freeware
Software that is available to anyone in the public domain without cost or copyright restrictions.
TOP OF PAGE

FTP
The File Transfer Protocol is the simplest method for moving files between computers on the Internet. You will often hear the terms "upload" and "download" used to describe the transfer of files from a client to a server (upload) or from a server to a client (download). These transactions can take place because the two computers involved are speaking the same language: FTP.
TOP OF PAGE

Geek Speak
The language of those who are thoroughly immersed in the computer or technology fields. You're learning it right now!
TOP OF PAGE

GUID
A Globally Unique IDentifier, used to identify a computer, a user, a file, etc. for tracking purposes. GUIDs are represented as thirty-two hex numbers.
TOP OF PAGE

Hacker
Depending on your point of view, a hacker is either a very talented software programmer or an individual who seeks to circumvent security systems and gain illegal access to networks.
TOP OF PAGE

Hard Disk
Every computer system must have a hard disk drive. It is a device that magnetically stores information from the computer system on to a disk. Most of the hard disks are permanently mounted on the drive mechanism and made of Hard Aluminium material with magnetic material coating.
The first commercially available hard disk were available in 10 MB - 100 MB of area. Today hard disks are available in 2.1 GB and 40 GB and over 80 GB memory area. Physically size is almost 3½" diameter.
TOP OF PAGE

Host name
The name of a computer that is attached to a network. The host name typically includes a computer name and the organization that the computer belongs to. Example: trixie.privacyfoundation.org.
TOP OF PAGE

HTML
The Hypertext Markup Language is a set of formatting codes which allows documents to be transferred and viewed by remote computers over the Internet through web browser software (i.e. Netscape Navigator or Microsoft Internet Explorer)
TOP OF PAGE

Internet
Now known simply as "the Net", the Internet is the conglomerate of physical resources that allow for the transfer of data from one remote location to another. The Internet comprises all the wiring, computers, and other hardware involved in these transfers.
TOP OF PAGE

IP
Abbreviation for Internet Protocol. It refers to the standards by which computers talk to other computers via the Internet.
TOP OF PAGE

IP Address
An IP address is a number that identifies a computer that is linked to the Internet. When displayed, an IP address is typically written as four numbers separated by periods. Example: 24.12.33.56.
TOP OF PAGE

ISDN
With ISDN (Integrated Services Digital Network) You can make a dial up connection to your ISP through ordinary telephone lines or special ISDN lines. ISDN lines are about two or three times faster than ordinary telephone lines. ISDN is telephone wire technology that allows digital data transmission to coexist with analoge pathways. With ISDN lines you need not a modem and instead use a device called a terminal adapter.
TOP OF PAGE

ISP
An Internet Service Provider (ISP) is a company or a group which provides access to users on a pay per use basis. ISPs already have dedicated connections to the internet and allow users to connect to their computers via modem to obtain access to the Internet. ISPs have already invested on hardware computers, modems, routes, telephone connections and so on. ISP can provide access to the internet through dial up service (ordinary telephone lines or ISDN), DSL leased bins or cable connections. Two types of services provided by ISPs are shell access and TCP/IP access. Shell access is text based i.e. email, ftp, telnet and text based browsing. TCP/IP access provides text as well as graphics
TOP OF PAGE

IT
(Information Technology)A broad term used to refer to any form of technology used to create, transfer, or store information in all it's various forms (text, images, sound, multimedia files).
TOP OF PAGE

Java Applet
A small program, written in the Java language, that provides additional features for a web page.
TOP OF PAGE

(information technology) Java Script
This is a scripting language, that allows a Web site to add features to a web page. (Note: JavaScript and Java are both programming languages, but unrelated.)
TOP OF PAGE

Leased Line
refers to a phone line connection that is rented for exclusive use from one computer or network to another or for constant access to the internet. It is a dedicated connection between your computer and the computer system of your ISP. You do not need to dial your ISP instead you are permanently connected to your ISP with dedicated telephone line connection. You can transmit digital data at 1.544 mega bits/sec.
TOP OF PAGE

Link
In HTML, a link is any text, image, or object on a web page that can be selected to connect a user to some other form of information or service. In most web pages, a link is used to bring up a new section of text, view an image, download a file, or open an entirely new web page on the screen.
TOP OF PAGE

Logon/Login
Any process in which a user must provide a specific user name and password to gain access to some remote computer, application, or service (such as e-mail).
TOP OF PAGE

MAC Address
The Media Access Control address is the unique ID serial number of the Ethernet card in one's computer. Ethernet is a commonly used networking technology, used to link computers together. MAC Addresses are needed in a Local Area Network for computers to communicate. Note that MAC addresses have nothing to do with Apple Macintosh computers.
TOP OF PAGE

Modem
The modulator- demodulator is a device that allows a computer to transmit data to other computers via. telephone lines. If you are using computer only for internal office use then you may
not go for modem. Almost all modems available in the market are also having a fax. With a fax/modem you can use your computer to send and receive faxes anywhere around the world. Unlike the normal fax machines, fax coming into your computer do not need to be printed. You can send a document or graphics from your screen to a normal fax machine.Speed of Modem : 28 Kpbs, 54 Kpbs, 128 Kpbs
TOP OF PAGE

Netiquette
Based on the idea, "treat others as you would like to be treated", netiquette is simply etiquette for the Internet. Rude or boorish behavior in using e-mail, chat and other Internet. services marks a failure to follow netiquette.
TOP OF PAGE

Network
Any collection of interconnected points tied together by communication paths (wiring, satellite, wireless broadcasts). A network may be described by its physical size, type of connection, level of access (public or private), or some other distinction.
TOP OF PAGE

Newbie
A term applied to any new user of a technology. Don't worry, it's not a derogatory label. Everyone was or will be a newbie at some point.
TOP OF PAGE

Newsgroup
The discussion of a specific topic through the exchange of messages at a central Internet. site. Newsgroups are maintained by Usenet, a worldwide network of discussion groups. Newsgroup dialogues are arranged in a hierarchy of posts and replies (called "threads"). Topics covered by newsgroups are incredibly varied, touching on such diverse issues as gourmet cooking, movie genres and mountain climbing.
TOP OF PAGE

OPT-IN
When a person gives explicit permission for a company to use personal information for marketing purposes.
TOP OF PAGE

OPT-OUT
When a person must instruct a company not to use their personal information for marketing purposes.
TOP OF PAGE

P3P
Platform for Privacy Preferences Project. A proposed browser feature to analyze privacy policies and allow users to control what personal information is revealed.
TOP OF PAGE

Packet
In Internet Protocol ( IP ), information is passed in little bunches of digital information called packets. Any given exchange between users and sites will consist of many packets, all of which are capable of going by different pathways to get to their assigned destination.
TOP OF PAGE

Packet Sniffer
A software tool used by programmers. It shows what packets of information are sent to and from a computer.
TOP OF PAGE

Password
A user-chosen word to allow access to a given web site or service.
TOP OF PAGE

PGP
Widely-used encryption software from PGP Security. The initials stand for Pretty Good Privacy.
TOP OF PAGE

PII Personally Identifiable Information such as a name, mailing address, phone number, social security number, or email address.
TOP OF PAGE

Ping
A short message sent by a computer across a network to another computer to confirm that the target computer is up and running. The target computer will send a ping back to confirm.
TOP OF PAGE

Plug-in
Any software program used in conjunction with a web browser to enhance a user's visit to a web site. Plug-ins allow web surfers to see movies, animation, and hear sound that has been incorporated into a web page.
TOP OF PAGE

Privacy Policy
A Web site’s statement to users of what information it collects and what it will do with the information after it has been collected.
TOP OF PAGE

Privacy Seal Program
A program to certify compliance with standards of privacy protection. Sites with the seal claim to adhere to these standards.
TOP OF PAGE

Proxy Server
It masks a computer going out on the web. In many corporate or institutional networks, all requests for web pages go through a proxy server .
TOP OF PAGE

Public Domain
Used to describe software or services that are completely open to public use. The authors intentionally share their work with any interested user. Shareware is one element of public domain software.
TOP OF PAGE

Query String
The last piece of a URL. A query string starts with a question mark and typical contains information that was typed into an HTML form. This data is used by a Web site to return information back to a user. Query strings are optional in URLs.
TOP OF PAGE

Real Audio
RealAudio is a method for delivering continuous or "streaming" sound to a user, rather than require the user to download the entire file before listening to it. RealAudio requires special software to receive and play the sounds. Many radio stations and some television stations offer RealAudio broadcasts of their programming.
TOP OF PAGE

Search Engine/Machine
At present there are over 80 lac web sites. The web is so huge that you need the services of search engine or machine to help you search information on a specific topic or word. Such engines or machine help you to search through more than 100 million web pages on the internet. A search engine is a special kind of website used to find other websites. Search engine take a word or phrase and hunt through lists of all the web pages in the internet to find ones that seem to match what you are trying to find. Some popular search engines are Alta Vista, Excite, Yahoo, Google, Infoseek, Hot Bot, Khoj.
TOP OF PAGE

SMTP
The Simple Mail Transfer Protocol is the set of procedures needed for users to send mail from their networked computer to remote users. The SMTP server accepts a users message and routes it to the chosen destination. SMTP is most-often used in conjunction with POP3 to manage the transfer of e-mail.
TOP OF PAGE

Static IP-Address
A static IP address is one that does not change everytime you go online. It is thus a flag to one computer.
TOP OF PAGE

TCP/IP
TCP/IP is Transmission Control Protocol / Internet Protocol. All computers connected to the internet share this common protocol (or language). TCP/IP is a standard which regulates how all computers connected to the internet must act when communicating with one another.
Every computer on a network running TCP/IP software knows exactly where on the `network map it is located. A computer routes information to the intended recipient via the fastest route.
The TCP/IP standard dictates the data sent by computer over the internet is broken into pieces called packets. These packets travel as separate entities from the sending computer to the destination computer and may even take different routes. At destination these packets are reunited in proper .
TOP OF PAGE

Telecommuting
Using telecommunications technology to conduct business from locations outside the traditional offic setting.
TOP OF PAGE

Trace Route
The path that a packet takes, computer by computer, across the Internet from a sending computer to a receiving computer.
TOP OF PAGE

TRUSTe
The TRUSTe "trustmark," an online branded seal displayed by member Web sites. The trustmark is awarded only to sites that adhere to established privacy principles and agree to comply with ongoing TRUSTe oversight and consumer resolution procedures.
TOP OF PAGE

Unzipping
The process of extracting compressed files from a single archive. To save space, many files that can be downloaded from Internet. servers are in a compressed format (i.e. .ZIP or .RAR) and must be unzipped before they can be accessed by a user. Special software, such as WinZip, is required to unzip an archive
TOP OF PAGE

URL
The address of a Web page. URL stands for Universal Resource Locator.
Example: http://www.Bradseleck.com
TOP OF PAGE

Virtual
An overused term that describes some item, service, or other element that reflects or mimics a real version of that thing. Virtual reality, for example, is a computer-generated approximation of a real setting and/or series of events without true physical dimensions.
TOP OF PAGE

Web Browser
A web brouser is a software that lets users gain access to and navigate the web. A web browser can interpret the links embedded in the documents and access the related documents on demand. The most popular web browser currently in use are Netscape Navigator (or Communicator) and Internet Explorer.
TOP OF PAGE


Web Bug  -  Clear Gif  -   Tracker Gif
A graphic on a Web page or in an email message that is designed to monitor who is reading the Web page or email message. A Web Bug is often invisible because they are typically only 1-by-1 pixel in size, with no color. Among the information collected is the IP address of the computer that the Web Bug is sent to, the URL of the page the Web Bug comes from and the time it was viewed. The Web Bug is also known as a 1-by-1 GIF, invisible GIF, and tracker GIF.
TOP OF PAGE

Web Master
An individual who creates, maintains, and/or updates the information content of a web site. The webmaster may also be responsible for managing the technology and programming used in making a site accessible through the Internet.
TOP OF PAGE

WWW
The World Wide Web is the conglomeration of all material that can be accessed through the Internet. and the community of users accessing that material. The web is distinct from the Internet. in that the net is the hardware and the web is the information conveyed by that hardware.
TOP OF PAGE

Y2K
An abbreviation for the Year 2000, identified by many technologically savvy individuals as the point when many critical computer systems will experience operational problems. The extent of these problems is a subject of heated debate within the online community..
TOP OF PAGE

Zip Drive
It is some what similar type as hard disk but it is portable and removable and stores data from 100 MB and more. The advantage of this drive is that it is removablelike floppy disks.
TOP OF PAGE

GLOSSARY BASICS

ASCII text
ActiveX control
Ad blocker
Ad Network
Anonymizer
Banner Ad
Binary
Booting
CD-ROM
Clear GIF
Client/Server
Chat
Cookie
Cookie Buster
Cookie,3rd party
CPU & Speed
Cyber
Data spill
Daemon
Dial up services
Digital certificate
Digital signature
DSL
Download
Dynamic IP address
E-business
E-mail
Encryption software
Ethernet adapter address
Fair Information Practices
Firewall
FAQ
Flaming
Floppy disk
Form
Freeware
FTP
Geek Speak
GIF, clear
GIF, tracker
GUID
Hacker
Hard Disk
Host name
HTML
Internet
IP
IP address
ISDN
ISP
Java Applet
JavaScript
Leased Line
Link
Logon/Login
MAC address
Modem
Netiquette
Network
Newbie
Newsgroup
OPT-IN
OPT-OUT
P3P
Packet
Packet sniffer
Password
PGP
PII
Ping
Plug-in
Privacy Policy
Privacy seal program
Proxy server
Public Domain
Query string
Real Audio
Search Engine
Search Machine
SMTP
Static IP address
TCP/IP
Telecommuting
Trace Route
Tracker GIF
TrustE
Unzipping
URL
Virtual
Web Browser
Web Bug
Web Master
WWW
Y2K
Zip Drive

| Introduction | Glossary | What is Firewall | Secutrity Site | Help Site |


Share This Page

If you can't hear the music, please click here to download the plug-in
© (2000)     SELECK
Any Suggestions, Questions, write me please !!