Saturday, December 25, 2010

Secure Sockets Layer


The most common security protocol used on the World Wide Web and commonly known as SSL. It was originally developed by the Netscape Corporation, but is now supported by all the major browsers . It is a flexible protocol that is able to use a variety of encryption schemes ranging from those suitable for domestic use to those which can be used for the highest classified government data interchange.

Feed


A general term for the electronic distribution of information, whether text, audio or video. It may refer to a syndicated radio or TV program that is transmitted on a regular basis, or to a syndication feed that is available on a Web site or blog

Directory


A listing of the files contained in a storage device, such as a magnetic disk.

Copyright


The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work

boolean Logic


A complete system for logical operations, used in many systems. It was named after George Boole, who first defined an algebraic system of logic in the mid 19th century. Boolean logic has many applications in electronics, computer hardware and software, and is the basis of all modern digital electronics

Blog


A website that displays in chronological order the postings by one or more individuals and usually has links to comments on specific postings.


Wiki


A Web site that can be quickly edited by its visitors with simple formatting rules

Webapp


Is an application that is accessed over a network such as the Internet or an intranet. The term may also mean a computer software application that is hosted in a browser-controlled environment or coded in a browser-supported language (such as JavaScript, combined with a browser-rendered markup language like HTML) and reliant on a common web browser to render the application executable.

Website


A presence on the World Wide Web. To qualify as a bona fide Web site, it must be available on the Internet around the clock. A Web site is a collection of Web pages, which are documents coded in HTML that are linked to each other and very often to pages on other Web sites

Web Cache


A folder full of Web pages in the user's computer that is maintained by the Web browser for a period of time. If the local, cached page has not been updated on the Web, it is retrieved immediately by the browser, saving download time.

Web 2.0


An umbrella term for the second wave of the World Wide Web, which was coined in a conference on the subject in 2004 by O'Reilly Media and CMP Media (later taking its parent name of United Business Media). Sometimes called the "New Internet" as well as "Internet 2.0," Web 2.0 is not a specific technology; rather, it refers to two major paradigm shifts.

Uniform Resource Locator (URL)


The unique Internet address assigned to a Web document or resource by which it can be accessed by all Web browsers

Social Networking Site


The use of Internet technologies to link together users of the Internet who have common interests. Typical technologies that are used in social networking include Wikis, blogs, instant messaging and podcasts . A good example of a social networking Web site is Facebook .

Really Simple Syndication(RSS)


A syndication format that was developed by Netscape in 1999 and became very popular for aggregating updates to blogs and news sites. RSS also stood for "Rich Site Summary" and "RDF Site Summary.

Portal


A Web "supersite" that provides a variety of services including Web search, news, blogs, discussion groups, shopping and links to other sites. The major general-purpose portals are Google, Yahoo!, MSN and AOL, all of which offer free Web-based e-mail accounts.

Podcast


Is a series of digital media files (either audio or video) that are released episodically and often downloaded through web syndication. The word usurped webcast in common vernacular, due to rising popularity of the iPod and the innovation of web feeds.

Tuesday, December 21, 2010

Mosaic


The Web browser created by Marc Andreessen, Eric Bina and others at the University of Illinois National Center for Supercomputing Applications (NCSA). It was the first multimedia browser for the Web, allowing text, images, sound and video to be accessed via a graphical user interface.

Internet Service Provider (ISP)


Company that provides Internet connections and services to individuals and organizations. For a monthly fee, ISPs provide computer users with a connection to their site, as well as a log-in name and password. They may also provide software packages, e-mail accounts, and a personal Web site or home page.

Internet Protocol (IP) Address


A computer's numeric address, such as 128.201.86.290, by which it can be located within a network.


Hypertext Transfer Protocol (HTTP)


A protocol used to request and transmit files, especially webpages and webpage components, over the Internet or other computer network.


Hypertext Markup Language (MTML)


A markup language used to structure text and multimedia documents and to set up hypertext links between documents, used extensively on the World Wide Web.

Home Page


The main page of a World Wide Web site or the page where an individual Web browser is set, as the first viewed page when the browser starts up.

Hit


A match of data in a search string against data that one is searching.

Geographic Imaging


As GIS can be thought of as a system, it digitally creates and "manipulates" spatial areas that may be jurisdictional, purpose or application oriented for which a specific GIS is developed. Hence, a GIS developed for an application, jurisdiction, enterprise, or purpose may not be necessarily interoperable or compatible with a GIS that has been developed for some other application, jurisdiction, enterprise, or purpose.

File Transfer Protocol (FTP)


A communications protocol used to transmit files without loss of data. A file transfer protocol can handle all types of files including binary files and ASCII text files

Domain


In a LAN, a subnetwork made up of a group of clients and servers under the control of one security database. Dividing LANs into domains improves performance and security.

Digital Certificate


Electronic credit card intended for on-line business transactions and authentications on the Internet. Digital certificates are issued by certification authorities. They typically contain identification information about the holder, including the person's public key used for encrypting and decrypting messages, along with the authority's digital signature, so that the recipient can verify with the authority that the certificate is authentic.

Cookie


A data file written to a hard drive by some Web sites, contains information the site can use to track such things as passwords, login, registration or identification, user preferences, online shopping cart information, and lists of pages visited.

Client

A computer or program that can download files for manipulation, run applications, or request application-based services from a file server.

ActiveX


ActiveX is a framework for defining reusable software components in a programming language independent way. Software applications can then be composed from one or more of these components in order to provide their functionality.

Saturday, December 18, 2010

Worm


Pertaining to a storage device, such as an optical disk, that allows the user to record data only once and to read back the data an unlimited number of times. Abbreviation for write-one, read-many.

Virus


A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be benign or have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory.

Urban Legend


Myths about anything and everything that barely have a shred of truth in them, yet seem to take on a persistent life of their own. Before the Internet, such urban folklore as "alligators in New York City sewers" was carried in magazines and newspapers

Trojan Horse


A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the program was loaded.

Time bomb


In computer software, a time bomb refers to a computer program that has been written so that it will stop functioning after a predetermined date or time is reached. The term "time bomb" does not refer to a program that stops functioning a specific number of days after it is installed; instead, the term trialware applies.

Teleconferencing


A conference held among people in different locations by means of telecommunications equipment, such as closed-circuit television.

Tagging


To select an element by clicking or tapping.

RDF Summary


RDFSummary is a product to display content from other web sites provided they make it available in RSS 0.9, 0.91, 0.92 or RSS 1.0 format.
The benefit of doing it this way is that the data you get is not encumbered with HTML, giving you more flexibility when applying your own look and feel.

Pyramid schemes


A fraudulent moneymaking scheme in which people are recruited to make payments to others above them in a hierarchy while expecting to receive payments from people recruited below them. Eventually the number of new recruits fails to sustain the payment structure, and the scheme collapses with most people losing the money they paid in.

Phishing


Phish is an Internet scam designed to trick the recipient into revealing credit card, passwords, social security numbers and other personal information to individuals who intend to use them for fraudulent purposes. The scam is known as "phishing" and the communications are sent to appear to look as if they come from reputable companies

Netiquette


Etiquette practiced or advocated in electronic communication over a computer network.

Logic bomb


A computer virus that remains hidden until it is triggered when certain specific conditions are met

Hoax


Something that has been established or accepted by fraudulent means

Fraud


A deception deliberately practiced in order to secure unfair or unlawful gain.

Filtering


To select data. Filters use patterns against which all data are compared and only matching data are passed through, hence the concept of a filter. For example, e-mail clients and servers can look for messages with text patterns that are recognized as spam and delete them.

Windows mail


The e-mail and newsgroup client in Windows Vista. Windows Mail replaced Outlook Express, the lite version of Outlook that came with previous Windows versions

User agent


A client program that is used to access servers on a network, typically the Internet.

text messaging


Sending short messages over a cellphone network.

Spam


Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail.

Signature


A set of alphabetic or numeric characters used to authenticate a cryptographic message by ensuring that the sender cannot later disavow the message, the receiver cannot forge the message or signature, and the receiver can prove to others that the contents of the message are genuine and originated with the sender.