Internet and WWW

Ace your homework & exams now with Quizwiz!

DNS

(Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.

SSL/ TSL

(Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. Transport layer security (TLS) is a protocol that provides communication security between client/server applications that communicate with each other over the Internet. It enables privacy, integrity and protection for the data that's transmitted between different nodes on the Internet. TLS is a successor to the secure socket layer (SSL) protocol.

web crawlers (or spiders)

A Web crawler is an Internet bot which systematically browses the World Wide Web, typically for the purpose of Web indexing. Web search engines and some other sites use Web crawling or spidering software to update their web content or indexes of others sites' web content.

DDoS

A denial of service attack is an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system.

mashup

A mashup also describes a Web application that combines multiple services into a single application. For example, a Web forum may contain a mashup that uses Google Maps to display what parts of the world the users are posting from.

search engine

A search engine is a software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords. Today, there are thousands of different search engines available on the Internet, each with their own abilities and features. Example: Bing, Google

IP Address: static/ dynamic

A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. A dynamic Internet Protocol address (dynamic IP address) is a temporary IP address that is assigned to a computing device or node when it's connected to a network. A dynamic IP address is an automatically configured IP address assigned by a DHCP server to every new network node.

spoofing

A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

adware

Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser.

browser

Also known as Web browser. A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. ... Currently popular browsers include Internet Explorer (IE), Mozilla, and Netscape Navigator.

HTML

HTML (Hypertext Markup Language) is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page. The markup tells the Web browser how to display a Web page's words and images for the user.

IPv6 and IPv4

IPv4 stands for Internet Protocol version 4. It is the underlying technology that makes it possible for us to connect our devices to the web. Whenever a device access the Internet (whether it's a PC, Mac, smartphone or other device), it is assigned a unique, numerical IP address such as 99.48.227.227. To send data from one computer to another through the web, a data packet must be transferred across the network containing the IP addresses of both devices. IPv6 is the sixth revision to the Internet Protocol and the successor to IPv4. It functions similarly to IPv4 in that it provides the unique, numerical IP addresses necessary for Internet-enabled devices to communicate. However, it does sport one major difference: it utilizes 128-bit addresses

protocol

In computing, a protocol or communication protocol is a set of rules in which computers communicate with each other. The protocol says what part of the conversation comes at which time. It also says how to end the communication.

IMAP

Internet Message Access Protocol (IMAP) is a standard protocol for accessing email on a remote server from a local client. IMAP is an application layer Internet Protocol using the underlying transport layer protocols to establish host-to-host communication services for applications. This allows the use of a remote mail server. The well-known port address for IMAP is 143.

meta tag

Meta tags are snippets of text that describe a page's content; the meta tags don't appear on the page itself, but only in the page's code.

IETF

Short for Internet Engineering Task Force, the main standards organization for the Internet. The IETF is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.

SMTP

Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server.

spyware

Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

ISP

Stands for "Internet Service Provider." An ISP provides access to the Internet. Whether you're at home or work, each time you connect to the Internet, your connection is routed through an ISP.

URL

Stands for "Uniform Resource Locator." A URL is the address of a specific webpage or file on the Internet.

TCP/ IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more computers to communicate. The Defense Data Network, part of the Department of Defense, developed TCP/IP, and it has been widely adopted as a networking standard.

HTTP

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.

IEEE

The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."

internet

The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.

WWW

The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet.

TOR

Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing.

VOIP

Voice over Internet Protocol. Voice over Internet Protocol is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.

WEB 3.0

Web 3.0 is slated to be the new paradigm in web interaction and will mark a fundamental change in how developers create websites, but more importantly, how people interact with those websites. Computer scientists and Internet experts believe that this new paradigm in web interaction will further make people's online lives easier and more intuitive as smarter applications such as better search functions give users exactly what they are looking for, since it will be akin to an artificial intelligence which understands context rather than simply comparing keywords, as is currently the case.

hotspot

Wireless (or wi-fi) hotspots are essentially wireless access points providing network and/or Internet access to mobile devices like your laptop or smartphone, typically in public locations.

Firewall

acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it.

cookies

cookie. A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences.

pharming

pharming redirects users to false websites without them even knowing it.

phishing

phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions.

spam

unk e-mail or irrelevant postings to a newsgroup or bulletin board.

cybersecurity

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security. ... Network security.


Related study sets

Chapter 8 Intercultural Communication

View Set

HW2 - Background Material, cont.

View Set

Chapter 1 Test Vocab (fill in the blank)

View Set

Chapter 12: Production and Cost

View Set