Tuesday, December 28, 2010

Libel

Use of print or pictures to harm a person's reputation.

Keywords

Words or phrases that describes content, they can be used as a metadata to describe images, text document, database records, and web pages.

Indexes

A reference table that contains the keys needed to address data items.

Monday, December 27, 2010

Secure Sockets Layer

To provide secure communication over the internet.

Feed

Some process for transferring data from one system to another in a predetemined form.

Directories

A file system that contains zero or more nodes(a hypertext document).

Copyright

The actual person who wrote the copyright has the right to make and share the information.

boolean Logic

A logic based on Boolean algebra.

Blog

Its like a kind of diary published to the world wide web.

Wiki

A web application that allows anyone visiting a website to edit content on it.

webapp

An application that is accessed via a web browser over a network such as the internet.

Website

Any computer on the internet running a world wide web server process.

Web Cache

The caching of web documents to reduce bandwith usage.

Web 2.0

It refers to the 2nd generation of the world wide web.

Uniform Resource Locator

The address of a specific website or file on the internet.

Social Networking Site

Is a website where you can communicate.

Really Simple Syndication

A method that provides website content such as news stories or software updates in a standard XML format.

Portal

A website that aims to be an entry point to the world wide web, that offers a search engine and links to useful pages, and possibly news or other service.

Podcast

An audio that is similar to a radio broadcast.

Mosaic

The first widely distributed graphical browser for the world wide web.

Tuesday, December 21, 2010

Internet Service Provider (ISP)

A company that provides other companies or individual that has access to the internet.

Internet Protocol (IP) Address

Its a code made up of numbers that are seperated by three dots that identify a particular computer on the internet.

Hypertext Transfer Protocol (HTTP)

A protocol used to transfer data through the world wide web.

Hypertext Markup Language (HTML)

Its a set of standards that's used to tag the elements of a hypertext document.

Sunday, December 19, 2010

Home Page

The initial page of a site on the world wide web. This is an example of a yahoo home page.

Hit

A request made to a web server.

Geographic Imaging

The image will be geographic.

File Transfer Protocol

A client-server protocol which allows a user on one computer to transfer files to and from another computer over a network.

Domain

A group of computers that can be accessed and administered with a common set of rules.

Digital Certificate

An attachment to an e-mail message used for security purposes to verify that a user sending a message is who he or she claims to be.

Cookie

A handle of agreement between 2 or more cooperating programs.

Client

A process that request a service of another computer system.

ActiveX

Software developers can create interactive web content for there application.

Friday, December 17, 2010

Worm

A program that spreads itself over a network and reproducing itself as it goes.

Virus

A type of malware that spreads itself to infect other programs then becomes trojan horses.

Urban Legend

A story that started with a grain of truth and has been retold until it is passed into the realm of myth then it ended up on the internet, the urban legend never dies.

Trojan Horse

Are software programs that can damage your computer.

Time Bomb

A bomb that is triggered by reaching at a time point.

teleconferencing

A buisness meeting through communicating devices.

Tagging

To assign a piece of information.

Spam

To post irrelevant messages to one or more mailing list.

RDF Summary

Descriptive of something.

Pyramid Schemes

Such activities as the transfer of information.

Phishing

Sending emails that are sent from legitmate websites such as ebay and etc.

Netiquette

Online manners and rules of conduct for internet users.

Logic Bomb

An authorized computer program that is inserted in the computer system, when its in active it starts interferes with the operation of the computer.

hoax

An act to decieve or trick like fraud.

Fraud

An instance of trickery.

Filtering

Its a program to process a data stream.

Windows Mail

Is an email and newsgroup client includes in windows vista.