Term
|
Definition
Portable Document Format
This is a file format developed by Adobe Systems in 1992. PDF captures formatting information from a variety of desktop publishing applications, making it possible to send formatted documents and have them appear on the recipient’s monitor or printer as they were intended. This is because a PDF will maintain the original fonts, images, graphics as well as the exact layout of the file.
|
|
|
Term
|
Definition
A novel or improved idea, device, product, etc, or the development thereof. |
|
|
Term
|
Definition
A computer is a programmable machine. A computer responds to a specific set of instructions in a well-defined manner and executes pre recorded instructions. |
|
|
Term
|
Definition
A computer. A computer that awaits and responds to requests for data.
Example: a DNS server awaits and responds to requests for urls to be translated to IP addresses |
|
|
Term
|
Definition
A groups of computers and servers that are connected to each other. |
|
|
Term
ISP: Internet service provider |
|
Definition
An ISP is your gateway to the Internet and everything else you can do online; a company that provides subscribers access to the Internet.
ISP. Examples:Verizon, ATT, Comcast, Time Warner, Cox |
|
|
Term
|
Definition
A computer that requests data stored on a server.
Example: When you type an address into your browser, your computer is the client and it sends the request to the DNS server. |
|
|
Term
|
Definition
A computer and storage device dedicated in storing files. Any user on the network can store files on the server.
|
|
|
Term
|
Definition
A server that sits between a client application, such as a web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request ot the real server. |
|
|
Term
|
Definition
The practice of using a network of remote servers from data centers all over the world hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer |
|
|
Term
|
Definition
Cloud server hosting is when hosting services are made available to customers on demand via the internet. Rather than being provided by a single server or virtual server, cloud server hosting services are provided by multiple connected servers that comprise a cloud |
|
|
Term
|
Definition
A program that handles all application operations between users and an organization’s backend business applications or databases. |
|
|
Term
|
Definition
A single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. |
|
|
Term
|
Definition
A computer that manages one or more printers, and a network server is a computer that manages network traffic. |
|
|
Term
|
Definition
A computer system that processes database queries. |
|
|
Term
|
Definition
A way of representing information using only two options, usually 0’s and 1’s.
Yes/No
True/False |
|
|
Term
|
Definition
Small chunks of information that have been carefully formed from larger chunks of information. |
|
|
Term
|
Definition
A set of rules and standards used to communicate between machines. |
|
|
Term
|
Definition
HyperText Transfer Protocol - the protocol used for transmitting web pages over the internet. |
|
|
Term
|
Definition
HTML HyperText Markup Language) is the language in which the content and formatting of a web page are written. |
|
|
Term
|
Definition
American Standard Code for Information Interchange. ASCII is the university recognized raw text format that any computer can understand. |
|
|
Term
|
Definition
The principle that all Internet traffic should be treated equally by Internet Service Providers |
|
|
Term
|
Definition
A contraction of “Binary Digit.” A bit is the single unit of information in a computer typically represented as 0 or 1. |
|
|
Term
|
Definition
To write code, or to write instructions telling the computer what to do. |
|
|
Term
|
Definition
Internet Engineering Task Force - Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite. |
|
|
Term
|
Definition
the Internet Society strives to make the world a better place |
|
|
Term
|
Definition
DNS, TCP, IP, and Physical Internet
|
|
|
Term
|
Definition
Domain Server Name or Domain Name Service: The service that translates URLs to IP addresses. |
|
|
Term
|
Definition
Transmission Control Protocol - Provides reliable, ordered, and error-checked delivery of stream of packets in the internet. TCP is tightly lightly linked with IP and usually seen as TCP/IP in writing. |
|
|
Term
|
Definition
A number assigned to any item that is connected to the Internet. |
|
|
Term
|
Definition
A device that forwards data packets along networks. A router is connected to at least two networks and are located at gateways. |
|
|
Term
|
Definition
Time it takes for a bit to travel from its sender to its receiver. |
|
|
Term
|
Definition
The number of bits that are conveyed or processed per unit of time. |
|
|
Term
|
Definition
Transmission capacity measure by bit rate. |
|
|
Term
|
Definition
A contraction of “Binary Digit.” A bit is the single unit of information in a computer, typically represented as a 0 or 1. |
|
|
Term
|
Definition
A byte is 8 bits since it was used to refer to groups of 8-bits that a
computer was processing. |
|
|
Term
|
Definition
A problem solving approach (algorithm) to find a satisfactory solution where finding and optimal or exact solution is impractical or impossible |
|
|
Term
|
Definition
A data compression algorithm that allows the original data to be perfectly reconstructed from the |
|
|
Term
|
Definition
Reducing information to a simpler form, to remove some details to focus on essential characteristics. It is typically possible to look at a system at many levels of abstraction, depending on how many detail is necessary to approach the challenge at hand. To simplify things pulling out specific differences to make one solution work for multiple problems. |
|
|
Term
File sizes, bytes, KB,MB,GB,TB |
|
Definition
A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits). |
|
|
Term
|
Definition
Put another way, a bit is either an ‘on’ or an ‘off’ which is processed by a computer processor, we represent ‘on’ as ‘1’ and ‘off’ as ‘0’. 8 bits are known as a byte, and it is bytes which are used to pass our information in its basic form - characters. |
|
|
Term
|
Definition
A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits).
byte - A series of 8 binarybits that digitally represent a single character to the
computer. Example: 00000001 = 1 Learn more here.
kilobyte - Approximately 1,000 bytes. Learn more here.
megabyte - Approximately 1,000,000 bytes. Learn more here.
gigabyte - Approximately 1,000,000,000 bytes. Learn more here.
|
|
|
Term
|
Definition
DNS: Translates a URL into an IP address. Note that a DNS request still is conducted over TCP/IP
TCP: Breaks larger messages into multiple packets and ensures all packets are received and ordered correctly
IP: Assigns IP addresses to computers and routes packets of data to the correct address
The Physical Internet: copper wire, fiber, optic cable, radio waves, etc |
|
|
Term
|
Definition
A computer that awaits and responds to requests for data. Example: a DNS server awaits and responds to requests for urls to be translated to IP addresses. |
|
|
Term
|
Definition
A computer that requests data stored on a server. Example: When you type an address into your browser, your computer is the client and it sends the requests to the DNS server. |
|
|
Term
|
Definition
To save space, some information is thrown away |
|
|
Term
|
Definition
The dimensions by which you can measure how many pixels are on a screen.
640 x 480 |
|
|
Term
|
Definition
Data the describs data. For example, a digital image may include metadata that describes the size of the image, number of colors, or resolution. |
|
|
Term
|
Definition
Short for “picture element” it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image. |
|
|
Term
Hexadecimal Number system |
|
Definition
A number system consisting of 16 distinct symbols - 0-9 and A-F - which can occur in each place value. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors. |
|
|
Term
|
Definition
A computation in which rows from a data set are grouped together and used to compute a single value of more significant meaning or measurement. Common aggregations include: Average, Sum, Max, Min, Count. A Summary Table, Calculation Area. |
|
|
Term
|
Definition
(or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg |
|
|
Term
|
Definition
In spreadsheet software, it is the name of the tool used to create summary tables. |
|
|
Term
|
Definition
A table that shows the results of aggregations performed data from a larger data set |
|
|
Term
|
Definition
A single value of either TRUE or FALSE |
|
|
Term
|
Definition
In programming, an expression that evaluates to TRUE or FALSE |
|
|
Term
|
Definition
A “hard” problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time. |
|
|
Term
|
Definition
A programming language designed by Sun Microsystems that can be integrated into standard HTML pages to add some dynamic features. |
|
|
Term
|
Definition
An overarching term for the coding tasks involved in making a program respond to events by triggering functions. |
|
|
Term
|
Definition
On-screen objects, like buttons, images, text boxes, pull down menus, radio buttons, check boxes, screens and so on.Input Controls: checkboxes, radio buttons, dropdown lists, list boxes, buttons, toggles, text fields, date field.
|
|
|
Term
|
Definition
Any valid unit of code that resolves to a value. |
|
|
Term
|
Definition
Finding and fixing problems in your algorithm or program. |
|
|
Term
|
Definition
The equality operator (sometimes read: “equal equal”) is used to compare two values, and returns to Boolean (true/false). Avoid confusion with the assignment operator “=”. |
|
|
Term
|
Definition
The common programming structure that implements “conditional statements” |
|
|
Term
|
Definition
Dictates what portions of code can “see” or use a variable, typically derived from where the variable was first created. (See Global v. Local) |
|
|
Term
|
Definition
Statements that only run under certain conditions. |
|
|
Term
|
Definition
A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements. |
|
|
Term
|
Definition
A programming construct used to repeat a set of commands (loop) as long as (while) a boolean condition is true. |
|
|
Term
|
Definition
Any sequence of characters between quotation marks (ex: “hello”, “42”, “this is a string!”). |
|
|
Term
|
Definition
An action that causes something to happen: click mouse, press a key, etc. |
|
|
Term
|
Definition
In JavaScript, an event triggered by pressing or releasing a key on the keyboard. For example: “keyup” and “keydown” are event types you can specify. Use event.key - from the “event” parameter of the onEvent callback function - to figure out which key was pressed |
|
|
Term
|
Definition
An extra piece of information that you pass to the function to customize it for a specific need. |
|
|
Term
|
Definition
Software that is intended to damage or disable computers, computer systems, and other software programs |
|
|
Term
|
Definition
A typical looping construct designed to make it easy to repeat a section of code using a counter variable. The loop combines the creation of a variable, a boolean looping condition, and an update to the variable in one statement. |
|
|
Term
|
Definition
A mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3 |
|
|
Term
|
Definition
A description of the behavior of a command, function, library, API, etc |
|
|
Term
|
Definition
A user interface element to use in HTML/JavaScript which acts as a digital canvas, allowing the programmatic drawing and manipulation of pixels, basic shapes, figures and images. |
|
|
Term
|
Definition
A prediction made by Gordon Moore in 1965 that computing power will double every 1.2-2 years, it has remained more or less true ever since |
|
|
Term
|
Definition
A process of encoding messages to keep them secret, so only :authorized” parties can read it. |
|
|
Term
|
Definition
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to “crack” the encryption. |
|
|
Term
|
Definition
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.
|
|
|
Term
|
Definition
Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt. |
|
|
Term
|
Definition
The action of doing something over and over again |
|
|
Term
|
Definition
The generic term for a technique (or algorithm) that performs encryption. In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. ... When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext |
|
|
Term
|
Definition
Ciphertext is encrypted text. Plaintext is what you have before encryption, and ciphertext is the encrypted result. The term cipher is sometimes used as a synonym for ciphertext, but it more properly means the method of encryption rather than the result |
|
|
Term
|
Definition
A technique for encryption that shifts the alphabet by some number of characters |
|
|
Term
Random substitution cipher |
|
Definition
An encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. |
|
|
Term
|
Definition
A business/corporate term for one-page document that summarizes a large, topic or plan. |
|
|
Term
|
Definition
A collection of routines, protocols, and commands to help a programmer create software applications. |
|
|
Term
|
Definition
A collection of commands/functions, typically with a shared purpose |
|
|
Term
|
Definition
A process that reverses encryption, taking a secret message and reproducing the original plain text. |
|
|
Term
|
Definition
A piece of code that you can easily call over and over again. |
|
|
Term
|
Definition
A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statement. |
|
|
Term
|
Definition
The common programming structure that implements “conditional statements” |
|
|
Term
|
Definition
A generic term for a programming data structure that hold multiple items. |
|
|
Term
|
Definition
To repeat in order to achieve, or get closer to, a desired goal. |
|
|
Term
|
Definition
Statements that only run under certain conditions. |
|
|
Term
|
Definition
A program which replicates or mimics key features of a real world event in order to investigate its behavior without the cost, time, or danger of running and experiment in real life. |
|
|
Term
|
Definition
A variable whose scope is “global” to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method |
|
|
Term
|
Definition
A program designed to run blocks of code or functions in response to specified events (e.g. a mouse clock). |
|
|
Term
|
Definition
To link together or join. Typically used when joining together text Strings in programming (e.g. “hello, “+name) |
|
|
Term
|
Definition
The visual elements of an program through which a user controls or communications the application. Often abbreviated UI. |
|
|
Term
|
Definition
All values in programming language have a “type” - such as a Number, Boolean, String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from “7” + “5” |
|
|
Term
|
Definition
A placeholder for a piece of information that can change |
|
|
Term
|
Definition
A function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger |
|
|
Term
|
Definition
A data structure in JavaScript used to represent a list. |
|
|
Term
|
Definition
A value sent back by a function to the place in the code where the function was called from - typically asking for value (e.g. getText(id)) or the result of calculation or computation of some kind |
|
|
Term
Every web page has its own URL |
|
Definition
Examples
https://www.techterms.com
https://techterms.com/definition/internet |
|
|
Term
|
Definition
Stands for "Wireless Fidelity" and it refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal. |
|
|
Term
|
Definition
A wireless technology that enables communication between computer devices. It is primarily used for short range connections. |
|
|
Term
|
Definition
Stands for "Fiber Optic Service" and it describes the use of fiber optic cables to transmit data via pulses of light. |
|
|
Term
|
Definition
4G is a collection of fourth generation cellular data technologies.4G technologies are required to provide peak data transfer rates of at least 100 Mbps. |
|
|
Term
|
Definition
A step-by-step list of instructions that allows you to complete a task. |
|
|
Term
|
Definition
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. |
|
|
Term
|
Definition
Stands for "Megabits Per Second." One megabit is equal to one million bits or 1,000 kilobits. While "megabit" sounds similar to "megabyte," a megabit is roughly one eighth the size of a megabyte (since there are eight bits in a byte). Mbps is used to measure data transfer speeds of high bandwidth connections, such as Ethernet and cable modems. |
|
|
Term
|
Definition
A permalink is the link to an individual blog post. You can Use the post name as the link display text. |
|
|
Term
|
Definition
https is 'hypertext transfer protocol SECURED'.
This means that the web page has a special layer of encryption added to hide your personal information and passwords. |
|
|
Term
|
Definition
A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents.
The most popular web browsers in 2016 are: Google Chrome, Firefox, Internet Explorer, and Safari. |
|
|
Term
|
Definition
'Phishing' is what modern-day con men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens, phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says "you should log in and confirm this". |
|
|
Term
|
Definition
Addons are custom software modifications. The user optionally installs addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader. |
|
|
Term
|
Definition
A trojan is a special kind of hacker program that relies on the user to welcome it and activates it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. |
|
|
Term
|
Definition
'Spam' has two meanings. 1) Spam can mean 'the rapid repetition of a keyboard command'. But more commonly, 2) spam is the jargon name of 'unwanted/unsolicited email'. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords. Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, and then either deletes or quarantines messages that appear to be spam. Look for a 'spam' or 'junk' folder in your mailbox to see your quarantine of filtered email. |
|
|
Term
Cloud Computing and Software-as-a-Service (SaaS)
|
|
Definition
Cloud computing is a fancy term to describe that your software is online and 'borrowed', instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users' email is all stored and accessed 'in the cloud' of the Internet, and not actually on their own computers. This is the modern version of the 1970's mainframe computing model. As part of the cloud computing model, 'Software as a Service' is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet and log into their online rented copies of their SaaS software |
|
|