Internet Concepts

ARPANET
Advanced Research Projects Agency Network
The precursor to the Internet, it was a network developed in the late 1960’s and early
Internet
Network of networks. Evolved from ARPANET
www
world wide web
e-mail
electronic mail
chat
A form of interactive online communication that enables users to have real-time conversations with other people who are also online
Instant Messaging
A technology that gives users the ability to identify people online and to exchange messages with them in real time
file transfer protocol
ftp. The standard method for downloading and uploading files over the Internet
Voice Over Internet Protocol
VoIP. A technology that uses Internet Protocol (IP) instead of voice recognition
ping
networking command used to test if destination computer is reachable
telnet
login remotely to another computer
remote desktop
when turned on it’s a Windows feature of letting someone connect to your computer and they can see what you see, great for tech support
Tracert
trace the route that data packets take to get from computer A to computer B
IP adress
number that uniquely identifies each computer or device connected to the internet such as 96.17.59.19 and corresponds to the Domain Name of www.nike.com
Domain Name Service Server
DNS Server. Database that helps our computer match web address to its IP address
Uniform Resource Locator
the location and access method of a resource on the Internet
domain name
it is the text name corresponding to the numeric IP address
internet2
aims to increase the size and strength of the Internet, not to replace it
top-level domain
suffix of the domain name (com, gov, net, etc..)
broadband
high speed internet connections vs. dial-up
cable internet service
through cable TV company such as comcast
Wi-Fi
Free or Fee-based wireless connections at hot-spots, restaurants, hotels, etc.
satellite
via satellite dish, works for rural communities
Digital Subscriber Line
DSL. over high-speed phone lines
Dial-Up access
The most basic type of Internet account
E-commerce
conducting business online
Business to Business
B2B. Like International Paper sells paper to other companies
Business to Consumer
B2C. Like Target.com
Consumer to Consumer
C2C. Like eBay.com
Firewall
a specially programmed computer system that “stands” between an organization’s LAN and the Internet
port
the place where information goes into and out of a computer, or both
blog
A Web site (or section of a Web site) where users can post a chronological, up-to-date e-journal entry of their thoughts
browser
A program used to view, download, upload, surf, or otherwise access documents (for example, Web pages) on the Internet
home page
The first page or front page of a Web site
MP3
A standard for storing and transmitting music in digital format across the Net
multimedia
A computer-based method of presenting combinations of text, images, graphics, animation, streaming audio or video, and so on
netiquette
The code of conduct and unofficial rules that govern online interaction and behavior, it comes from “net” plus “etiquette.”
plug-in
A software program that extends the capabilities of your browser in a specific way, giving you, for example, the ability to play audio samples or view movies on your computer screen
Real Simple Syndication
RSS. a format for distributing and gathering content from sources across the Web, including newspapers, magazines, and blogs
Streaming
to transmit a media clip (which could be audio or video or both), over a network, so that it begins to play back as quickly as possible
web server
it’s a software program that serves Web page files to users
Frequently asked questions
A list of questions and answers related to a Web site, newsgroup, software, or any kind of product or service
Hot spot
refers to places that have wireless Internet connections
podcast
A free, downloadable audio file that can be listened to on your computer–where you can burn it to a compact disc–or on an MP3 player or iPod to enjoy
virus
A self-replicating software program that is designed to infect a computer by rapidly spreading from one file to another
worm
similar to virus, except they are usually spread over a network without human help
trojan horse
malware that appears to be benign or desirable and tricks the user into allowing the program access to their computer.
spyware
tyope of malware that collects information about users without their knowledge often to track browsing habits and to create pop-up ads.
malware
intentionally malicious software or code that is designed to damage your computer or collect information without your knowledge
phishing
mail or IM scams that are disuised to look like official communications from a legit website
pharming
technique used to redirect a legit website’s traffic to another illegitamate website in order to gain access to a user’s personal info
spam
unsolicited email or junk mail, much of which contains money scams or sexual content
hoax
email chain letter that warns of impending viruses and tries to scare users into forwarding and continuing the hoax email.
browser hijacking
occurs when malware or spyware replaces your browser’s home page with its own in order to force more hits to a particular website.