1. Bitmap - A representation, consisting of rows and columns of dots, of a graphics image
in computer memory. The value of each dot (whether it is filled in or not) is stored in one or more bits of data. For simple monochrome images, one bit is sufficient to represent each dot, but for colors and shades of gray, each dot requires more than one bit of data. 2. Domain Name - A method of identifying computer addresses. 3. Cookie - Information (in this case URLs, Web addresses) created by a Web server and stored on a user's computer. This information lets Web sites the user visits to keep of a user's browsing pattterns and preferences. People can set up their browsers to accept or not accept cookies. Cookies are most commonly used to track website activity. When you visit some sites, the server gives you a cookie that acts as your identification card. Upon each return visit to that site, your browser passes that cookie back to the server. In this way, a web server can gather information about which web pages are used the most, and which pages are gathering the most repeat hits. Cookies are also used for online shopping. Online stores often use cookies that record any personal information you enter, as well as any items in your electronic shopping cart, so that you don't need to re-enter this information each time you visit the site. 4. Firewall - The name "firewall" derives from the term for a barrier that prevents fires from spreading. An effective software firewall isolates your computer from the Internet using a code that sets up a blockade to inspect each packet of data, from or to your computer — to determine whether it should be allowed to pass or be blocked. 5. Bandwidth - refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
6. Intranet - An intranet is basically a private, internal internet specific to an organisation
or group. 7. Java - is a programming language that is commonly used in the development of client- server web applications. 8. Phishing - is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords. 9. Cybersquatting is a term used to describe an individual or company who intentionally purchases a domain and holds it until they can sell it at a premium price. Cybersquatting is sometimes referred to as domain squatting and typo squatting. 10. The deep web (also referred to as the invisible web, hidden web, or deepnet) is a large section of content on the World Wide Web that isn't catalogued by standard search engines. Most of the deep web contains harmless information, but it can also foster serious criminal activity. The deep web is quite large; several times the size of the surface web. 11. IETF - Short for Internet Engineering Task Force, IETF is responsible for handing the standardization of the Internet 12. AJAX - Asynchronous JavaScript And XML is a web programming technique in JavaScript that enables a portion(s) of a web page to be reloaded from the server without the whole page being reloaded. 13. CSS - Cascading Style Sheets are files which contain a list of rules for how a website should be displayed. CSS controls things like fonts, colors, layout and spacing. 14. IDE - An Integrated Development Environment is software designed for programmers to write, debug and test their code. 15. JSON - JavaScript Object Notation, pronounced Jason, is a format for storing data. 16. SVG - Scalable Vector Graphics is a format used a lot on the web for graphics that can be scaled to any size without becoming ‘pixelated’. SVG files are written in the XML language. 17. CDN - Content Delivery Network: a network of distributed servers that store duplicate copies of our web content. CDNs allow us to deliver content to each user from a server that is closer to their location or less overloaded. This way we can achieve better performance and reduce server downtime. 18. ADSL - Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second). 19. Cloud computing - Cloud computing refers to the storing and accessing of data and programs over the Internet instead of on another type of hard drive. Examples of Cloud services include iCloud, Google Cloud and Dropbox. 20. SSL - or secure sockets layer, is a protocol that allows Internet users to send encrypted messages across the Internet. It is generally used when transmitting confidential information (e.g. personal data or credit card details).
Remastering Distro Linux Ubuntu 16.04 LTS (Xenial Xerus) Using Respin For Supporting Optimization of Operation System Performance in PT Pegadaian Regional Office X PDF