The Internet invented a whole new way to shop and with it came a whole new vocabularly list. When you come across a foreign phrase that has something to do with the world-wide-web, check out our Glossary for a definition you can understand.
Click on the first letter of the Term you are looking for:
- Any software which serves banner ads or pop-up ads to you while using it. It is sometimes installed in freeware or shareware which you download from the nets, and supports one more channel for advertisers to reach you. Some adware will also track your files, net usage, and software and report it back to advertisers to assist them channel relevant ads to you.
- animated GIF (Graphics Interchange Format).
- A Graphics Interchange Format (GIF) graphic file, which consists of two or more images shown in a timed sequence to give the effect of motion.
- anonymous ftp
- A traditional form of login to a public ftp site where the username is given as ‘anonymous’ and the password is your e-mail address, for example ‘davidkasteler@Mainstreammedia.com’
- Application Program Interface (API)
- An Application Program Interface (API) is an interface between the operating system and application programs that specifies how the two communicate with each other.
- In computer networking and computer science, digital bandwidth, network bandwidth or just bandwidth is a measure of usable or consumed data communication resources expressed in bit/s or multiples of it (kbit/s, Mbit/s etc).
How fast can you send through a connection? You can usually measured in bits-per-second (bps.). An entire page of English text is about 16,000 bits. A fast modem can move more or less 57,000 bits in one second. A Full-motion full-screen video would require roughly estimated 10,000,000 bits-per-second, depending on compression.
- A high-speed line or series of connections that produces a major pathway within a network. The term is relative as a backbone in a diminutive network will likely be much smaller than many non-backbone lines in a large network.
- bang address
- An old system of mail addressing in Unix-to-Unix Copy Program (UUCP) networks, where the successive routing addresses were followed by exclamation points (also known as bangs) and the addressee was the last element.
- Blog — (weB LOG)
- A blog (a contraction of the term “weblog”). A blog is a type of website, usually supported by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video.
Many blogs provide commentary or news on a particular subject but some are perform as more personal online diaries. A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its theme. The ability for readers to leave comments in an interactive format is a necessary part of many blogs. Most blogs are mainly textual, although some focus on art (artlog), photographs (photoblog), sketches (sketchblog), videos (vlog), music (MP3 blog), and audio (podcasting). Micro-blogging is another type of blogging, featuring only very short posts.
- Browsers such as Netscape and Microsoft Internet Explorer hold copies of newly visited web files, both HTML and binary files, in disk memory. This disk memory space is called “cache”.
It gives an advantage of much quicker loading when files are stored on disk than when they must be transferred from the web. The disadvantage is that it will sometimes displays an old version of a file from your disk when a newer one is available on the web.
- A form of real-time electronic communications where participants type what they want to say, and it is recapitulated on the screens of all other participants in the same chat. Internet Relay Chat (IRC) is an Internet protocol for chat, and there are many other chat systems in services like Delphi. iChat and ICQ are other commonly used chat systems.
- coax, coaxial cable
- A type of cable which contains two conductors, one inside and the other outside around it, separated by an insulating layer. Each of them join the same axis, giving the cable its name co-axial, the same kind of cable that brings cable TV into your house.
The term coaxial comes from the inner conductor and the outer protective device sharing the same geometric axis. Coaxial cable is used as a transmission line for radio frequency signals, in applications such as connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and dispersing cable television signals.
- The legal protection against copying and the specific rights allowing copying given to original works, which may be in printed or photographically or electronically stored words, music, performing and or visual arts. The purpose of copyright is not just to protect the rights, but tosubstantiate the rules under which copies or portions may be made to make a work more widely available.
- To transfer (usually data or programs, character sets, software, etc.) from a server or host computer to one’s own computer. The opposite of it is upload.
- A database is a comprehensive collection of data records. On web databases, records comes with a search interface to find web pages, graphics, audio files, newspaper files, books, movies, press releases, or almost anything from very general to very specific areas of interest.
- In Internet Protocol (IP)Transmission Control Protocol(TCP) networks, datagram is a synonym for packet A packet is a formatted block of data carried by a packet mode computer network.
- domain name
- Domain name addresses, together with Internet Protocol (IP) addresses, are the two forms of Internet addresses in common use. Domain name addresses all end with an accurate top-level domain. Some examples of top-level domains are:
- a two-letter country code, such as us, uk, or mx
- An electronic mail is one of the earliest standard Internet protocols which enables people with different computers and operating systems to communicate with each other. It allows one-to-one or one-to-many mailings. The Internet electronic mail standards include no provision for authenticating the sender, which makes it possible for spammers to use false From addresses and routing.
- Encryption is the term applied to the various methods of encoding data or altering a file using secret code so that it cannot be read by third parties. Web based credit card transactions are commonly encrypted.
- A local area network (LAN) protocol developed by DEC, Intel, and Xerox as an outgrowth of Harvard graduate student Bob Metcalfe’s dissertation on packet networks. Computers using TCP/IP often link to the Internet via ethernet LANs. Ethernet typically uses a (daisy chain) topology.
- A network that supplements a closed intranet by providing access to customers, suppliers, subcontractors, and many others outside the organization who have a need for selective information from the organization.
- Firewall refers to the concept of a security interface between a closed system or network and the outside Internet that blocks or manages communications in and out of the system. The security may be supported by passwords, authentication techniques, software, and hardware.
- Freeware (from “free and software”) is a computer software that is available for use at no cost or optional fee. In general, it is proprietary software available at zero price, and is not free software.
- A Microsoft HTML (Hypertext Mark-up Language) web page editing program. It is not really a professional product and also very limited in functionality. Professional web designers will generally avoid using Frontpage, because it locks the developer into using the application, by producing proprietary code that is difficult to edit by hand.
- FTP — (File Transfer Protocol)
- A very common procedure of moving files between two Internet sites. File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over an Internet Protocol (IP) computer network, such as the Internet.
- The technical meaning is a hardware or software set-up that enables communication between computer networks that use different communications protocols, for example, America Online has a gateway that translates between its internal, proprietary e-mail format and Internet e-mail format. Another, sloppier meaning of gateway is to describe any mechanism for providing access to another system, for example, an AOL might be called a gateway to the Internet.
- Graphics Interchange Format (GIF)
- GIF images are bitmap image format used extensively on web sites. They are important because they can be compressed to a very small file size and so are utilised extensively for logos and web buttons.
GIFs are made smaller by excluding as many shades of color as possible, still maintaining a reasonable representation of the image. It is well-suited for simpler images such as flat coloured graphics or logos with solid areas of color.
- One billion bytes is equal to one Gigabyte. It is commonly abbreviated by GB or Gbyte. The term gigabyte is oftentimes abbreviated as simply a “gig” in speech. It has 1,024 megabytes and precedes the terabyte unit of measurement.
- Gopher is a Client and Server style program, which requires that the user have a Gopher Client program or follows the client/server model. Although Gopher spread rapidly across the globe in only a couple of years, it has been largely supplanted or replaced by Hypertext, also known as WWW (World Wide Web). Thousands of Gopher Servers are still on the internet and we can expect they will remain for a while.
- HTML (Hypertext Markup Language)
- Hypertext Markup Language is a cross-platform text-formatting system for creating web pages, including copy, images, sounds, frames, animation many other.
- A hyperlink is commonly called a link, is an electronic connection between one web page to either (1) other web pages on the same web site, or (2) web pages located on another web site. More specifically, it is a connection between one page of a hypertext document to another
- Hypertext is any formatted file or text that links to other information. By clicking on a link in a hypertext document, another information will be retrieved or displayed.
One example of classic type of hypertext document is an html web pages.
- Home page
- The home page of a website is the starting point or first/front page that is generally viewable. For example, http://www.Mainstreammedia.com/index.html is the home page of MainstreamMedia.com.
- IMAP (Internet Message Access Protocol)
- It is sometimes listed as Internet Mail Access Protocol. A mail protocol that provides management of received messages on a remote server. The user can review headers, create or deleteor manage folders/multiple mailboxes and messages, have their status changed, etc.
- The internet is the term for the Global networked collection of computers that communicate with each other via a standard set of network protocols – Internet Protocol. Some of the communication protocols that sit on top of the internet are E-mail, WWW, and FTP.
It describes more than one local network interconnected by bridges or routers.
- A network of networks that interconnects within a single widespread organization and uses Internet Protocol (IP). It works as the same principles of an internet, but is located within the private network of single organisation, or company.
Human resources documents, corporate literature, etc., can be placed on the company intranet, because that is only for internal use.
- IP (Internet Protocol)
- Internet Protocol provides a distinctive set of rules for sending and receiving information through the Internet. It is also a method by which digital information is sent from one computer to another on the internet. Every computer in the internet has a unique identifying number, which is called as an IP address. It can function as a kind of virtual assistant telephone number.
- Java is often used to build large, complex systems that involve several different computers interacting across networks, for example transaction processing systems, create software with graphical user interfaces such as editors, audio players, web browsers, etc. It is very popular for creating programs that run in small electronic devicws, such as mobile telephones.
It refers to a programming language developed by Sun Microsystems. Java is simple, object-oriented, distributed, interpreted, robust, secure, architecture-neutral, portable, high-performance, multithreaded, dynamic, buzzword-compliant, general-purpose programming language.
- JPEG (Joint Photographic Experts Group)
- The term stands for “Joint Photographic Experts Group,” because that is the name of the committee that developed the format. JPEG images are not limited or restricted to a certain amount of color, like GIF images are. Therefore, JPEG format is best for compressing photographic images
- JDK — (Java Development Kit)
- JDK is a software development package from Sun Microsystems that implements the basic set of tools needed to write, test and debugJava applications and applets.
- A kilobyte is a storage unit capable of storing 1,024 bytes of data or information.
- KBps (kilobytes per second)
- A kilobyte per second (kB/s or kBps) is a unit of data transfer rate equal to:
- 8,000 bits per second, or
- 1,000 bytes per second, or
- 8 kilobits per second.
- Kbps(Kilobits per second)
- This term is commonly used in describing data transfer rates. For example, two common modem speeds are 33.6 Kbps and 56 Kbps. A thousand bytes, that is usually 1024 bytes. A kilobit per second (kbit/s or kb/s or kbps) is a unit of data transfer rate equal to:
- 1,000 bits per second or
- 125 bytes per second.
- Keywords are words or identifiers that has a particular meaning to the programming language. They can be used as metadata in describing images, text documents, database records, and Web pages. A user may “tag” pictures or text files with keywords that are relevant and appropriate to their content.
Keywords are used in two different ways: 1)as search terms for Search Engine Search Terms wherein, you type keywords that tell the search engine what to search for. For example, if you are searching for used restaurants, you may enter “famous restaurants” as your keywords. You need to use specific keywords for you to find specific and useful results. 2)Web Page Description Terms Keywords can also describe the content of a Web page using the keyword meta tag. This tag is placed in the section of a page’s HTML and includes words that describe the content of the Web page. The purpose of the keywords meta tag is to help search engines identify or describe and organize Web pages. A meta tag is is a special HTML tag that is used to store information about a Web page but is not displayed in a Web browser.
- LAN (Local Area Network)
- LAN is a computer network limited to a small area such as an office building, university/school, or even a residential home. Most mid to large-sized businesses today use LANs, which makes it an easy way for employees to share information. Currently, Ethernet-based and use software from Novell or Oracle are the most common type of LAN’s.
- An active connection to another web page, location in a web page, file, or other Internet resource. A link is simply the area on a graphic, or word on a web page that, when clicked, it will take the user to another web page or “jump” into another web page, web site or file download.
- Linux is a used Open Source Unix-like operating system. It is also a free Unix-type operating system originally created by Linus Torvalds and was first released it in1991. There are different versions of Linux for almost every available type of computer hardware from desktop machines to IBM mainframes.
- If you are asked to enter your username and password, you are being asked to enter your login information. A login is a combination of information or data that authenticates your identity. This could be a name and password, an Identification number and or security code. Many secure Web sites use login information to authenticate or validate visitors before allowing them access to certain areas of the site.
- Technically speaking, megabyte is a million bytes. In many cases the term means that 1024 kilobytes, which is a more than an even million bytes
- A modem (modulator/demodulator) is the hardware required to connect telephone lines and is important for dial-up connections to the Internet. It allows a computer to talk to other computer through the phone system.
- Mailing list or Mail List
- It is usually an automated system that allows people to send e-mail to one address, whereupon their message is copied and sent to all of the other subscribers to the maillist. In this way, people who have many different kinds of e-mail access can participate or join in discussions together.
- Just like us humans, computers rely a lot on memory. They need to process and store data or information, just like we do. However, computers store data/information in digital format, which means the data can always be called up exactly the way it was stored.
It can refer to any medium of data storage, which usually refers to RAM, or random access memory. When your computer boots up, it loads the (OS) operating system into its memory. This allows your computer to access system operations, such as handling mouse clicks and keystrokes, since the event handlers are all loaded into RAM. Whenever you use an open a program, the interface and functions used by that program are also loaded into RAM.
- Any time you connect two or more computers together so that they can share resources, you have a computer network. Connect two or more networks together and you have an internet.
- Someone who is new to the web, a newsgroup, e-mail, or any other Internet application.
- Netscape or Netscape Browser
- Netscape Communications (formerly known as Netscape Communications Corporation and commonly known as Netscape) was a US computer services company,and it was best known for its web browser. It was once the main graphical web browser on the internet.
- Network Topology
- A network topology defines the arrangement of systems on a computer network. It defines how the computers, or nodes, within the network are arranged and linked to each other. These are some common network topologies: star, ring, line, bus, and tree configurations. These topologies are defined below:
- Star – One central note is connected to each of the other nodes on a network. Similar to a hub joined to the spokes in a wheel.
- Ring – Each node is connected to exactly two other nodes, forming a ring. It can be visualized as a circular configuration. Requires at least three nodes.
- Line – Nodes are arranged in a line, where most nodes are connected or linked to two other nodes.
- Bus – Each node is connected or linked to a central bus that runs along the entire network. All information transmitted across the bus can be received by any system in the network.
- Tree – One “root” node joins or connects to other nodes, which in turn connect to other nodes, forming a tree structure.
- Operating System
- Also known as an “OS,” this is the software that communicates with computer hardware on the most basic level. Without an operating system, no software programs can run. The OS is what allocates memory, processes tasks, accesses disks and peripherials, and serves as the user interface. Operating systems like Windows, Mac OS, and Linux, are very important. Without them, programmers would have to write about ten times as much code to get the same results.
- OASIS (Organization for the Advancement of Structured Information Standards)
- OASIS was founded in 1993 under the name SGML Open as a consortium or association of vendors and users devoted to developing guidelines for interoperability among products that support the Standard Generalized Markup Language (SGML)
OASIS is a not-for-profit consortium that drives the development, convergence and adoption of open standards for the global information society.
- Offline is an opposite of online. In general, “online” indicates the stae of connectivity, while “offline'” indicates a disconnected state.
Offline can also mean not being connected to the Internet. When you disconnect from your ISP or pull out the Ethernet cable from your computer, your computer is offline.
- Open Content
- Copyrighted information/data (such as this Glossary) that is made available by the copyright owner to the general public under license terms that allow reuse of the material, often with the requirement (as with this Glossary) that the re-user grant the public the same rights to the modified version that the re-user received from the copyright owner.
- A code used to gain access authentisized you (login) to a locked system. Good passwords contain letters and non-letters and are difficult combinations.
- The paste function can be used to paste copied data into text documents, images, Web browser address fields, and just about any place where you can enter data. To paste data, however, you need first to copy it to the “Clipboard”, which is a temporary storage area in your system’s memory, or RAM. After that, select the data you want to copy and then choosing “Copy” from the program’s Edit menu. Once you have data copied to the Clipboard, you can paste it within the same or within a different document in the same program. To paste a copied piece of data, choose “Paste” from the Edit menu in the program you wish to paste the data in.
- PDF (Portable Document Format)
- PDF or Portable Document format is a multi-platform file format developed by Adobe Systems. A PDF file often used as a format which allows more complete, controlled layout of a page and its graphics and text than a conventional HTML does. To create a page in PDF format, you need Adobe Acrobat and or other premium Adobe software. The Portable Document Format is based on the widely used Postcript document-description language. Both PDF and Postscript were developed by the Adobe Corporation.
- A post is a single message sent to a newsgroup or a messageboard.
- A backup of packets or messages awaiting processing.
- Quick Time Video
- Quick Time Video is the Apple technology that allows video, digitized sound and music, 3D, and virtual reality to be viewed on your web site. Quick Time Video is available for Macintosh and Windows-based computers
- A search request submitted to a database (such as the search engine and directory databases) to find a particular piece of information or all records that meet the search criteria.
- QBE (Query By Example)
- QBE, also known as Query By Example, is a feature included with various database applications that provides a user-friendly techniques of running database queries. Typically without QBE, a user must write input commands using correct SQL (Structured Query Language) syntax.
- When an event or function is processed immediately, it is said to occur in real-time. To say something takes place in real-time is the same as saying it is happening “live”.
- Refresh is a command that reloads the contents of a window or Web page with the most current information.
The term “Refresh” may also refer to the redrawing process of a computer monitor. This systematic series usually happens many times per second and is called the “refresh rate.”
- Router is a special-purpose computer (software package) that handles the connection between 2 or more Packet-Switched networks. Routers spend all their time looking at the source and destination addresses of the packets passing through them and determining which route to send
- RDF — (Resource Definition Framework)
- A set of rules, usually, a sort of language for creating descriptions of information, especially information available on the World Wide Web. RDF could be used to describe a collection of books, or artists, or a collection of web pages as in the RSS data format which uses RDF to make machine-readable summaries of web sites. RDF could also be used to define the relationship between the data in a database and the way t hat data is displayed to a user.
- Search Engine
- A Search Engine is a system for searching the information available on the Web. Search engines on the web consist of four elements:
- a program that roams the area to be searched, collecting data records (typically, web pages) and links to more data. These are variously known as spiders, worms, crawlers, or other colorful names.
- a database or collection of records recovered by the spiders or other type of collector.
- an index of the database collected to enable fast access to terms that you search for and their supporting records. Indexes may be enhanced by controlled vocabularies.
- A search interface–the form in which you enter your search terms and the software behind it that queries the index, retrieves matches, and ranks for relevance and organizes the data for follow-on searches.
- It serves information to computers that connect to it. When users connect to a server, they can definitely access programs, files, and other information from the server. Some common servers are Web servers, mail servers, and LAN servers. A single server machine often does have several different server software packages running on it, thus providing many different servers to clients on the network. Server software is designed so that additional capabilities can be added to the main program by adding small programs known as servlets. **Client means, a software program that is used to contact and obtain data from a Server software program on another computer, often across a great distance. One specific kind of client is a Web Browser.
- A small computer program designed to be add capabilities to a larger piece of server software. Common examples are “Java servlets”, which are small programs written in the Java language and which are added to a web server.
- It refers to a junk e-mail or irrelevant postings to a newsgroup. Some unsolicited e-mail like refinancing your home, losing those extra pounds and reversing aging are all to be considered as spam.
- This is a data transfer system that transfers digital signals at 1.544 megabits per second (quite a bit faster than a 56K modem, which maxes out at around 0.056 Mbps). T-1 lines are commonly used to connect large Local Area Networks to the Internet. Hundreds of people can be accessing the Internet from one T1 line because of its large bandwith. However,T-1 line could move a megabyte in less than 10 seconds. That is still not fast enough for full-screen, full-motion video, for which you need at least 10,000,000 bits-per-second. For this reason, multiple T1s are often used.
- A leased-line connection capable of carrying data at 44,736,000 bits-per-second. That is more than enough to do full-screen, full-motionvideo. A T3 line actually 30 times faster, supporting data transfer rates of 44.736 megabits per second.
- The term “tag” can be used as a noun or verb. As a noun, a tag is a basic element of the languages used to create web pages (HTML) and similar languages such as XML. Another, more recent meaning of tag is related to reader-crearted tags where blogs and other content (such as photos, music, etc.) may be “tagged” which means to assign a keyword, such as “politics” or “gardening”, this enables searches for “all the blog postings in the past week that are tagged ‘prenatal care'”
- 1000 gigabytes.
- A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Usually you will use terminal software in a personal computer – the software pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else.
- Terminal Server
- A special purpose computer that has places to plug in many modemson one side, and a connection to a LAN or host machine onthe other side. Thus the terminal server does the work of answering the calls and passes the connections on to the appropriate node. Most terminal servers can provide PPP or SLIP services if connected to the Internet.
- Top Level Domain (TLD)
- The last (right-hand) part of a complete Domain Name. For example in the domain name www.matisse.net “.net” is the Top Level Domain. There are a large number of TLD’s, for example .biz, .com, .edu, .gov, .info, .int, .mil, .net, .org, and a collection of two-letter TLD’s corresponding to the standard two-letter country codes, for example, .us, .ca, .jp, etc.
- Transferring data (usually a file) from a the computer you are using to another computer. The opposite of download.
- Uniform Resource Identifier (URI)
- An address for s resource available on the Internet. The first part of a URI is called the “scheme”. the most well known scheme is http, but there are many others. Each URI scheme has its own format for how a URI should appear. Here are examples of URIs using the http, telnet, and news schemes: telnet://well.sf.ca.us, news:new.newusers.questions
- Uniform Resource Locator (URL)
- The term URL is basically synonymous with URI. URI has replaced URL in technical specifications.
- URN — (Uniform Resource Name)
- A URI that is supposed to be available for along time. For an address to be a URN some institution is supposed to make a commitment to keep the resource available at that address.
- A chunk of computer programming code that makes copies of itself without any concious human intervention. Some viruses do more than simply replicate themselves, they might display messages, install other software or files, delete software of files, etc.
A virus requires the presence of some other program to replicate itself. Typically viruses spread by attaching themselves to programs and in some cases files, for example the file formats for Microsoft word processor and spreadsheet programs allow the inclusion of programs called “macros” which can in some cases be a breeding ground for viruses.
- Voice Over IP (VOIP)
- A specification and various technologies used to allow making telephone calls over IP networks, especially the Internet.
Just as modems allow computers to connect to the Internet over regular telephone lines, VOIP technology allows humans to talk over Internet connections.
Costs for VOIP calls can be a lot lower than for traditional telephone calls. Because the IP networks are packet-switched this allows for vastly different ways of handling connections and more efficient use of network resources.
- VPN — (Virtual Private Network)
- Usually refers to a network in which some of the parts are connected using the public Internet, but the data sent across the Internet is encrypted, so the entire network is “virtually” private.
- Very Easy Rodent Oriented Net-wide Index to Computerized Archives (Veronica)
- Developed at the University of Nevada, Veronica was a constantly updated database of the names of almost every menu item on thousands of gopherservers. The Veronica database could be searched from most major gophermenus.
- Web 2.0
- Web 2.0 is term that was introduced in 2004 and refers to the second generation of the World Wide Web. The term “2.0” comes from the software industry, where new versions of software programs are labeled with an incremental version number.
Some considered features to be part of Web 2.0 are:
- Blogs – also known as Web logs, these allow users to post thoughts and updates about their life on the Web.
- Wikis – sites like Wikipedia and others enable users from around the world to add and update online content.
- Social networking – sites like Facebook and MySpace allow users to build and customize their own profile sand communicate with friends.
- Web applications – a broad range of new applications make it possible for users to run programs directly in a Web browser.
- Web Host
- A web host is needed in order for you to publish a website. It stores all the pages of your and makes them available to computers connected to the Internet. and makes them available to computers connected to the Internet. When visitors enter your domain name into their browser’s address field, the IP address is located and Web site is loaded from your Web host.
- Web Page
- A document designed for viewing in a web browser. Typically written in HTML. A web site is made of one or more web pages. It is also the web pages that makes up the World Wide Web. These documents are written in HTML (hypertext markup language) and are translated by your Web browser.
- The entire collection of web pages and other information (such as images, sound, and video files, etc.) that are made available through what appears to users as a single web server. Typically all the of pages in a web site share the same basic URL, for example the following URLs are all for pages within the same web site:
Simply, a website is a collection of web pages.
- It is a gebneric name for Intel processor. It was released after the original 8086 processor. The architecture is called x86 because Intel used to give the earliest processors in this family numeric brand names ending in the sequence “86”, the 8086, the 80186, the 80286, the 386, and the 486 processors. Because one cannot trademark numbers, Intel and most of its competitors stopped using numeric brand names after the 486, and started using proper word brand names, such as Pentium, but the earlier brand naming scheme stuck on to become the name of the entire family.
- eXtensible Markup Language (XML)
- A widely used system for defining data formats. XML provides a very rich system to define complex documents and data structures such as invoices, molecular data, news feeds, glossaries, inventory descriptions, real estate properties, etc.
- XML Remote Procedure Call (XMLRPC)
- A protocol for client-server communication that sends and receives information “on top of” HTTP. The data sent and received is in a particular XML format specifically designed for use with XMLRPC.
- Extensible Hypertext Markup Language (XHTML)
- Basically HTML expressed as valid XML. XHTML is intended to be used in the same places you would use HTML (creating web pages) but is much more strictly defined, which makes it a lot easier to create sofware that can read it, edit it, check it for errors, etc.
XHTML is called to be an “extensible that is why many web developers can create their own objects and tags for each Web page they build.
- Year 2000 (Y2K)
- Y2K stands for “Year 200”. However, this Y2K term is often used to refer to the “Millenium Bug”. This bug is a little creature that lives inside older computers.
When the year 2000 rolls around, the little bug will self-destruct, blowing up the computer it was residing in. The chain of explosions across the world will be catastrophic, causing global panamonia and LA riots.
There are also some of the predictions like the millennium end in war, pestilence, famine, earthquakes, volcanoes, floods; with the sinking of California to join Atlantis under the sea, the coming of the Antichrist, the rapture of the faithful into heaven, or maybe even campaign finance reform and a balanced federal budget? Perhaps none of the above, despite many predictions. But there is one certain peril that humanity faces as the century hurtles to its end: the millennium bug.
- Yahoo! is one of the Internet’s leading search engines. It is also the largest Web portal, providing links to thousands of other websites. Yahoo! also considered as the most visited home page. These links include sites from the Yahoo! Directory as well as news stories that are updated several times a day.
Aside from being a portal and search engine, Yahoo! offers several other services as well. Some of these services include:
- Yahoo! Finance – stock quotes and financial information
- Yahoo! Shopping – online retail and price comparison services
- Yahoo! Games – online games playable over the Internet
- Yahoo! Groups – organized discussions among Internet users
- Yahoo! Travel – travel information and booking services
- Yahoo! Maps – maps and directions
- Yahoo! Messenger – instant messaging
- Yahoo! Mail – free Web-based e-mail
- A yobibyte is a contraction of yotta binary byte which is a unit of information or computer storage, commonly abbreviated YiB. It is a unit of data storage that equals 2 to the 80th power, or 1,208,925,819,614,629,174,706,176 bytes.
- It is a unit of information or computer storage equal to one septillion bytes. It is commonly abbreviated YB. A yottabyte is 2 to the 80th power or 1, 208, 925, 819, 614, 629, 174, 706, 176 byt
- It is a unit of information or computer storage equal to one sextillion. A zettabyte is 2 to the 70th power, or 1,180,591,620,717,411,303,424 bytes. It is abbreviated by ZB.
- Zero Insertion Force (ZIF)
- ZIF is an acronym for zero insertion force, a concept used in the design of IC sockets, invented to avoid problems caused by applying force upon insertion and extraction.
It is a type of CPU socket on a computer motherboard that allows for the simple replacement or upgrade of the processor.
- The Zip file format is a data compression and archive format. Windows users will see Zip term when looking for files on the Internet. A zip file (.zip) is a “zipped” or compressed file.
For instance, when you download a file, if the filename looks like this: “filename.zip,” you are downloading a zipped file. “Zipping” a file involves compressing one or more items into a smaller archive. A zipped file takes up less hard drive space and takes less time to transfer to another computer.
- Zone File
- A zone file is a text file that describes a portion of the domain name system (DNS) called a DNS zone. A zone contains information that defines mappings between domain names and IP addresses and other resources, organized in form of resource records. These records define the IP address of a domain name, the reverse lookup of an IP to other domains, and contain DNS and mail server information.