Technical Net Jargon
Bots crawl along the backbone, swinging from server to server and round a few routers. If this makes no sense at all, you need to get acquainted with some technical Net terms.
Applet
A small java application designed to run on a web page. Java is a programming language that can be used to produce games and utilities such as currency converters. Applets are downloaded by your browser and run on your computer.
Arpanet
The Advanced Research Project Agency NETwork. Arpanet was a military network built by the US government at the height of the Cold War, and was designed to withstand a possible nuclear attack. Arpanet was the forerunner to today's Internet.
Backbone
The main data highway that carries enormous numbers of bits and bytes around the world. These are the high speed connections that cross the globe and form the top level of the network hierarchy that in turn forms the Net.
Bot
A program designed to search the Net for information automatically. Many of the search engines use bots to scout the Net for URLs and appropriate keywords to include in their database. There are also IRC Bots, and Bots designed by hackers to do various tasks.
Client Server
Describes the relationship between two different computers. One computer, the client, requests information from another computer, the server. The server gives, the client takes. When you access a web page, your client computer requests that page from a web server.
Domain Name
Identifies a computer connected to the Net. Domain names typically consist of a host name such as netmag, followed by a top level domain category, such as .com, .co, .org, and then perhaps a country abbreviation, like uk. Domain names are easy to remember aliases for numerical IP addresses.
Domain Name Systems
A bit like a phone book of Internet addresses. Every Net address or, to use its proper name, IP address, consists of a series of digits, such as 194.217.172.1. It isn't easy to remember a series of digits, for each website you want to visit, so the Domain Name System was created. This is a database system that looks up Internet addresses based upon domain names.
Download
When you downloading something from the Net - web page or a piece of software - you are transferring it to your computer from another computer.
File Transfer Protocol (FTP)
A protocol that enables files to be transferred between computers on the Internet. You can download files from web pages, but FTP is a more efficient means of doing it.
Firewall
A security setup that prevents unauthorized users gaining entry to a private network, such as a corporate network.
Gateway
A computer that controls access on to the Internet - for example, you'll go through a gateway computer to get to the Net from your company's local area network. This means your system administrator can monitor all your Net activities - so watch out.
Hop
A connection between computers during the transfer of information across the Net. Data travels on the Net from computer to computer - from your computer, to your ISP's, to a web site computer, and so on. Depending on computer activity around the world, there can be any number of hops between you and, say, a web page you want to retrieve. The more hops there are, the longer it will take to retrieve information.
Hypertext Markup Language (HTML)
The mark-up language used to create web pages. HTML consists of formatting commands which a browser reads, and then uses to display the web pages accordingly.
Hypertext Transfer Protocol (HTTP)
The protocol used to transfer HTML documents across the Net. When there's an ‘s' on the end, giving https at the start of a web address, you have accessed a secure server and are transferring files securely.
Off Line
When you are not connected to the Internet.
Online
When you are connected to the Internet.
Ping
Or packet InterNet Groper, to be precise. It's a small program that can send a test message to a server to see whether it exists.
Router
A computer that redirects data - your ISP has a router that'll send your Net requests in the right direction. Also known as a switch.
Server
A computer that handles requests from client machines. Mail servers deliver mail, FTP servers give out files, web servers store web pages.
Secure Server
A computer that handles encrypted data for secure transactions, for example, when you buy something online you are connected to a secure server so your credit card details cannot be read by anyone else.
Upload
To transfer data from your computer to another computer.
URL
Uniform Resource Locator - another way to say web site address.
Related Tags: computer, computers, network, server, client, java, domain, technical, browser, name, bots, applet
Subscribe to Sandra Prior's Online Newsletter
and get up to date Computer Technology
News delivered right to your email box for free.
See website for details http://usacomputers.rr.nu and http://sacomputers.rr.nu.
Recent articles in this category:
- Offshore it Consulting Services India
Cost effectiveness of productions offers a cutting edge in this age of stiff competition. Lower is - Geeks Who?
Geeks are characterized by the tools they use. What all one should have to qualify to be called gee - Now Wi-fi (vi-fi) in Vehicles
This is a Wi-Fi age. Those who need can find Wi-Fi hotspots everywhere; in home, hotels, airport lo - How Web Development Can Catalyze Your Profit Prospective?
Website is the heart and soul of an online business. It depicts the appearance of your products, se - Free Cisco Ccna, Ccnp, Ccent Tutorial on Switching, Spanning-tree Protocol (stp)
A Layer 2 switch, which functions as a transparent bridge, offers no additional links for redundanc - Windows Vista Sidebar, Gadgets, Easy Wireless Networking and Improved Back Features
Microsoft has tried to put "active" items on the Windows desktop for nearly a decade. Finally, with - Windows Vista Features and Upgrading the Windows Vista Versions
Microsoft Windows Vista is the latest workstation version of the Windows operating system and is de - Comptia A+, Network+ Certification Tutorial - Function of Network Hubs
A hub is a device used to connect all of the computers on a star or ring network. A hub is nothing - Tips for Unlock Iphone 3G
Anybody who owns an iPhone wants to have it unlocked and they need unlock iPhone 3G tips, in genera - Unlock Iphone Tutorial
Most of the people consider that it is difficult to unlock iPhone, but in fact, this process is eas
Most viewed articles in this category:
- It Consulting - Buyer Fraud Prevention
Hiring the wrong computer consultant is not only frustrating, but it can also leave you cheated of y - San Francisco Web Design and Web Development Services
A San Francisco Web Development and Web Design Services, #10 offers a full range of marketing and we - Complex Issues, Comprehensive Solutions by Freelance Providers
As business increases, customers are most certainly asking for their share of higher business value, - Gaming and Graphic Design Computer Monitor Solutions
CRT screens are fast moving towards obsolescence and are now almost the preserve of Graphic designer - Help Wanted - One New Customer for Growing IT Business
Your computer services business is the same, you need customers. But do you need as many as you thin - What Does it Take to be a Top IT Manager Today
Well-Run Concepts has been conducting research on how we can quantify what personal skills or compet - What Are Hosted Applications?
As access to the Internet becomes more widespread with faster, more reliable and 'always on' connect - Password Security
In the past I've never really paid much attention to security issues when it comes to user names and - General Computer Maintenance For The Masses
Reorganizing the file systemGo to “Start” > “Run” > Type in “def - How Does Human Resource Management in the Workspace Effect Me?
How often do you find yourself saying: "I wish I knew how to learn more about this topic" Well, w