You are on page 1of 2

INTERNET TERMINOLOGIES AND CODES

1. Bitmap - A representation, consisting of rows and columns of dots, of a graphics image


in computer memory. The value of each dot (whether it is filled in or not) is stored in one
or more bits of data. For simple monochrome images, one bit is sufficient to represent
each dot, but for colors and shades of gray, each dot requires more than one bit of data.
2. Domain Name - A method of identifying computer addresses.
3. Cookie - Information (in this case URLs, Web addresses) created by a Web server and
stored on a user's computer. This information lets Web sites the user visits to keep of a
user's browsing pattterns and preferences. People can set up their browsers to accept or
not accept cookies. Cookies are most commonly used to track website activity. When you
visit some sites, the server gives you a cookie that acts as your identification card. Upon
each return visit to that site, your browser passes that cookie back to the server. In this
way, a web server can gather information about which web pages are used the most, and
which pages are gathering the most repeat hits.
Cookies are also used for online shopping. Online stores often use cookies that record
any personal information you enter, as well as any items in your electronic shopping cart,
so that you don't need to re-enter this information each time you visit the site.
4. Firewall - The name "firewall" derives from the term for a barrier that prevents fires
from spreading.
An effective software firewall isolates your computer from the Internet using a code that
sets up a blockade to inspect each packet of data, from or to your computer — to
determine whether it should be allowed to pass or be blocked.
5. Bandwidth - refers to the maximum amount of data that can travel a communications
path in a given time, usually measured in seconds.

6. Intranet - An intranet is basically a private, internal internet specific to an organisation


or group.
7. Java - is a programming language that is commonly used in the development of client-
server web applications.
8. Phishing - is a type of email fraud in which the perpetrator sends out emails that appear
to come from a legitimate service or reputable company, such as a bank or an email
service provider. These emails aim to lure recipients to reveal confidential information
that the perpetrator can use for their financial advantage - for example, online banking
log-in details and passwords.
9. Cybersquatting is a term used to describe an individual or company who intentionally
purchases a domain and holds it until they can sell it at a premium price. Cybersquatting
is sometimes referred to as domain squatting and typo squatting.
10. The deep web (also referred to as the invisible web, hidden web, or deepnet) is a large
section of content on the World Wide Web that isn't catalogued by standard search
engines. Most of the deep web contains harmless information, but it can also foster
serious criminal activity. The deep web is quite large; several times the size of the surface
web.
11. IETF - Short for Internet Engineering Task Force, IETF is responsible for handing the
standardization of the Internet
12. AJAX - Asynchronous JavaScript And XML is a web programming technique in
JavaScript that enables a portion(s) of a web page to be reloaded from the server without
the whole page being reloaded.
13. CSS - Cascading Style Sheets are files which contain a list of rules for how a website
should be displayed. CSS controls things like fonts, colors, layout and spacing.
14. IDE - An Integrated Development Environment is software designed for programmers to
write, debug and test their code.
15. JSON - JavaScript Object Notation, pronounced Jason, is a format for storing data.
16. SVG - Scalable Vector Graphics is a format used a lot on the web for graphics that can be
scaled to any size without becoming ‘pixelated’. SVG files are written in the XML
language.
17. CDN - Content Delivery Network: a network of distributed servers that store duplicate
copies of our web content.
CDNs allow us to deliver content to each user from a server that is closer to their location
or less overloaded. This way we can achieve better performance and reduce server
downtime.
18. ADSL - Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line
(DSL) broadband technology that is used to connect to the Internet. It uses standard
telephone lines to deliver high-speed data communications (up to 24 megabytes per
second).
19. Cloud computing - Cloud computing refers to the storing and accessing of data and
programs over the Internet instead of on another type of hard drive. Examples of Cloud
services include iCloud, Google Cloud and Dropbox.
20. SSL - or secure sockets layer, is a protocol that allows Internet users to send encrypted
messages across the Internet. It is generally used when transmitting confidential
information (e.g. personal data or credit card details).

You might also like