Ancient IT Dictionary

As I was clearning up my notes, I came across this ancient list of IT documents.
Alias A type of nickname (usually short and easy to remember) that refers to a type of network resource. Aliases are used so you won’t have to remember the long and difficult names.
Anonymous FTP By using the word “anonymous” as your user ID and your e-mail address as the password when you login to an FTP site, you can bypass local security checks and gain limited access to public files on the remote computer. This type of access is available on most FTP sites.
Authentication Any process that ensures that users are who they say they are. When you type your name and password, you are authenticated and allowed access.
Bandwidth This refers to the difference (measured in Hz), between the highest and lowest frequencies of a transmission. Most people loosely refer to bandwidth as the amount of data that can be transferred over a network connection.
Bookmark To mark a document or specific place in a document for later retrieval. Nearly all Web browsers support a bookmarking feature that lets you save the address (URL) of Web page so that you can easily revisit the page at a later time.
Bounce If you send e-mail and it fails to arrive at its intended recipient for any reason (wrong user name, network failure, etc.), the message “bounces” and returns to you. The subject line in a bounced message usually says something like: “Undeliverable Mail” or “Message Undeliverable.”
Browser A program used to view, download, upload, surf or otherwise access documents (pages) on the World Wide Web. Browsers can be text based meaning they do not show graphics or images but most however are text and graphical based. Browsers read “marked up” or coded pages (usually HTML but not always) that reside on servers and interpret the coding into what we see “rendered” as a Web page. Netscape Navigator and Microsoft Internet Explorer are examples of Web browsers. The program you are using right now to view this information is called a browser.
Bug A programming error that causes a program or computer system to perform erratically, produce incorrect results, or crash. The term bug was coined when a real insect was discovered to have fouled up one of the circuits of the first electronic digital computer, the ENIAC.
Cache A cache temporarily stores the information on a page in your computer. If you request a page that is stored in a cache, Browsers can retrieve the page from the cache more quickly than retrieving the page again from it’s location out on the network.
Client In Internet terms, it’s an application that performs a specific function, such as Telnet or FTP. It’s the “front-end” to an Internet process. In more general terms, a client is computer system or process that requests a service of another computer system or process. The much talked about “client-server architecture” refers to a workstation requesting the contents of a file from a server.
Cookie A special piece of information about you, something you clicked on, and/or your computer system which is stored in a text file on your hard drive. This information is usually accessed by a server when you connect to a Web site which wants to know some information about you or your system. One common occurrence of a “handling of a cookie”, would be when you as a user, log into a system through a Web site. After you enter in your username and password, a text file is saved by your browser for later access. This prevents you from having to log in again if you happen to leave the Web site and then return at a later time. Cookies are also used in the process of purchasing items on the Web. It is because of the cookie, that the “shopping cart” technology works. By saving in a text file, the name, and other important information about an item a user “clicks” on as they move through a shopping Web site, a user can later go to an order form, and see all the items they selected, ready for quick and easy processing.
Domain A “logical” region of the Internet. People sometimes refer to them loosely as “sites.” Generally, a domain corresponds to an IP address or an area on a host.
Electronic Mail (E-mail) A method by which computer users can exchange messages with each other over a network. E-mail is probably the most widely-used communications tool on the Internet. There are many quirky conventions to E-mail, but most entail a “To:”, “From:”, and “Subject:” line. One of E-mail’s advantages is its ability to be forwarded and replied to easily. If an e-mail is badly received by a group or user, the sender is likely to get “flamed.”
Encryption The basis of network security. Encryption encodes network packets to prevent anyone except the intended recipient from accessing the data.
Ethernet A standard and probably the most popular connection type for Local Area Networks (LANs). It was first developed by Xerox, and later refined by Digital, Intel and Xerox (see also “DIX”). In an Ethernet configuration, computers are connected by coaxial or twisted-pair cable where they contend for network access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) paradigm. Ethernet can transfer information at up to 10 Megabit-per-second (Mb/s).
Gateway A kind of “go-between” device or program that passes information between networks that normally couldn’t communicate. What used to be called a gateway is now called a router.
Hacker A computer user who works to understand the “ins and outs” of computers, networks, and the Internet in general. Hackers are generally benign, and believe that information should be free.
Host A computer that is attached to a network or the Internet. Hosts allow users on client machines to connect and share files or transfer information. Individual users communicate with hosts by using client application programs.
Hypertext A type of text that allows embedded “links” to other documents. Clicking on or selecting a hypertext link displays another document or section of a document. Most World Wide Web documents contain hypertext.
Image Map A single graphic image containing more than one hot spot. Image maps are used extensively on the WWW. Each hot spot in a Web image takes you to a different Web page or to another area of the same Web page.
Instant Messaging A type of communications service that enables you to create a private chat room with another individual. Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that particular individual.
Interface Something that connect two separate entities. For example, a user interface is a part of a program that connects the computer with a human operator (user).
Internet Protocol Address (IP Address) The 32-bit address defined by the Internet Protocol. Every resource on the Internet has a unique numerical IP address, represented in dotted decimal notation. IP addresses are the closest thing the Internet has to phone numbers. When you “call” that number (using any number of connection methods such as FTP, HTTP, Gopher, etc.) you get connected to the computer that “owns” that IP address.
Macro A symbol, name, or key that represents a list of commands, actions, or keystrokes. Many programs allow you to create macros so that you can enter a single
character or word to perform a whole series of actions.
Packet The common term for the standard unit of data sent across a network. When you send or request data, it is broken up into packets which meet back together again at the destination and are rejoined.
Post Office Protocol (POP) A protocol designed to allow single users to read mail from a server. There are three versions: POP, POP2, and POP3. When e-mail is sent to you, it is stored on the server until accessed by you. Once you are authenticated, the POP is used to transmit the stored mail from the server to your local mailbox on your client machine.
Router A device that forwards traffic between networks. Forwarding decisions are made based on network layer information and routing tables, often constructed by routing protocols.
Server Simply, a computer that provides resources, such as files or other information. Common Internet servers include file servers and name servers Domain Name Service.
T1 A term used to denote the type of connection of a host to the Internet. A T1 transmits a DS-1 formatted digital signal at 1.544 megabits per second.
T3 A term used to denote the type of connection of a host to the Internet. A T3 transmits a DS-3 formatted digital signal at 44.746 megabits per second.
TCP/IP Stack To properly use the TCP/IP protocol, PCs require a TCP/IP stack. This consists of TCP/IP software, sockets software (such as WINSOCK.DLL for Windows machines), and hardware driver software (known as packet drivers). Windows 95 comes with Microsoft’s own built-in TCP/IP stack, including version 1.1 of Microsoft’s WINSOCK.DLL and packet drivers.
Virus A program which replicates itself on computer systems by incorporating itself into other programs that are shared among computer systems.
WHOIS An Internet program (related to Finger and the White Pages) that lets you enter an Internet entity (such as domains, networks, and hosts) and display information such as a person’s company name, address, phone number and e-mail address.
Winsocks Stands for “Windows Sockets.” Winsocks is a set of specifications or standards for programmers creating TCP/IP applications for use with Windows.
World Wide Web The “Web” is a collection of online documents housed on Internet servers around the world. The concept of the Web was created by Tim Berners-Lee and researchers at CERN in Switzerland. Web documents are written or “coded” in HTML. To access these documents, you have to use a Web browser, such as Netscape, Microsoft Explorer, Opera or Mosaic. When these browsers access (or hit) a page, the server uses the HyperText Transfer Protocol (HTTP) to send the document to your computer.

Recent Posts
Why Job Sites Are Disappearing? · Apprentice, Journeyman, and Master · List of Docker Registries · Installing Debian 10 buster on virtualbox · Cross platform terminal emulators · Keep active keep happy · Tools to secure your devices · Secrets of the Face and Palm · Vim as an IDE for developers · WordPress multisite on Debian · Mongodb guide to basics · Jagged Alliance 2 some historic notes · Antivirus solutions and why its needed · A taovilla review and history · MacOS X high sierra running out of disk space · Airprint on bonjour missing scan function for all-in-one printers · Improving terminal load times · Knowing website design costs and pitfalls · Keeping secure and checking if your password is safe? · Installing Virtualbox Guest Additions for Debian Stretch · Windows XP Virtualbox on Mac OS X High Sierra · DNS settings and getting on public DNS · Extracting OVF from VMware ESXI 6.0 · Installing LMDE 2 Betsy · SSL Certificates and Encryption · Machine Learning with Spark · Installing Lubuntu in Virtualbox · Getting started with Docker (docker-toolbox) · Ubuntu upgrade limited boot space · Top 10 Browsers Overview · Taovilla Oracle app beta built using meteorjs · Setting up Debian on VirtualBox · The HomeBrew doctor · Afterlife Buddhist Chants · Caffeine icon for ubuntu / lubuntu · Updating wordpress without FTP · Preinstalled Languages on mainstream OS · Reminisce of Xcom · Java install on Ubuntu · Display image as ASCII art · VirtualBox Resizing Lubuntu Guest Linux · Introducing Samurai · Buddhist Chants · Macbook Pro Key mapping for Lubuntu · Common Apache Nginx commands · The nothingness between Zen and Tao · Tao, Zen and Theravada · Meditation for Growth · Buddhism · Refreshing Git versioned files · Basic Environments for Jira · Coffee Shops and Feng Shui · Converting a hg mercurial to git repository · Long term domain name costs comparison · SVG Graphing · 2 ways to Php install on mac · New EBook Launched Secrets of Human Face and Palm · Introducing Samurai and Installing Meteorjs to own server · Improving the speed of Linux Mint · Ma Zu Deity in Malaysia Sabah · SVG graphics with Javascript · FTP Clients for Mac OS X · Windows Apps on Mac · Programming Languages Compared · Hackers Natural Cure · Publishing on Ebooks · Editors such as SublimeText2 · Good Coding Practice · LMDE Linux Mint Debian Edition · Heroku Webapp · Hadoop Single node 32bit on 12.10 Mint XFCE · Tracing User Behaviour FRUBO · Installing Nginx on MacOSX · Installing Ruby on MacOS X · Turn off annoying compress outlook message · HTML5 Apps on Cordova PhoneGap with MacOSX · Choosing and using Latex · Reviewing Javascript World · Gemstones · Han Xin the Hero of Han · Gathered Wisdoms · Oriental Calendar · Li Qi Feng Shui · Five Elements Feng Shui · Taoist Philosophy Overview · 25th Anniversary Singapore Taoist Philosophy Group · Draw up an Ubuntu Server Environment · Draw up a Lightweight Mail Server · Draw up a Web Database · Php CMS and Frameworks · Drawing up a Web Service · Draw up a Virtual Cloud Server · Unlocking and Flashing your ZTE Blade · Tai Chi and Qi Gong · Pip error in Python with Homebrew · Setting up homebrew for OSX · Personality by Month · Life and Death in Oriental Beliefs · Windows and Linux Desktop Security · Ruan Tou Feng Shui · Life Analysis and Prediction · Cemetery Feng Shui · Taoism · Confucius · Guan Gong · Meditation · Gu Qin · TexMaker with Glossary on Mac · Quick way to OpenStack on Lubuntu · Ancient IT Dictionary · Oriental Poems · Fan Li · IChing · Dao De Jing · TeaTime for Basic Python · CVs and Jobhunting · Chinese Input on Linux Ubuntu · Research in Computer Science · Reviewing Applications on My Mac · Reviewing Applications on My Windows · Installing Windows XP · Installing wireless on Linux Ubuntu or Mint · Restoring an Amazon EC2 Backup · Mac Update PASV problem · Reviewing Green Computing · Consuming the Cloud Storage Space · Using Cherokee and WordPress Whine · Disabling Lubuntu Screensaver · Installing Lubuntu from USB drive · Searching for a Micro Mini CMS · ReStructuredText in Python · Rackspacecloud Vs Amazon · Hacking your old PSP · Attending Atlanta 55th MMM Conference · Smart devices for everyday use · Creative Programmers · Linux Settings · Embarking on Further Education · Machine Learning · Mac Tips – Viewing hidden files on desktop · Creating PDF files for free · Online Media for All · C# ASP Settings · SVN Git and Mercurial Versioning · Getting the last inserted id using datasets · Think Lucky and be Happy · AngieGallery Design · AceTravel Design · Letter to Mum · Prison Vs Work · Irish Daughter · Are you a carrot, an egg or a coffee bean? · Home Media Entertainment Setup · Collection of Interesting sites · Studying in London · Great Oriental eats in London · CMS Joomla, WordPress, Drupal compared ·

© 2024 · mirageglobe · using zenifywp theme by www.mirageglobe.com ·
  · RSS Feed