Fund. of WWW Class.

Week 6 Homework Definitions

Flaming: is a hostile and insulting interaction between Internet users. Flaming usually occurs in the social context of a discussion boardInternet Relay Chat (IRC) or even through e-mail. A flame war usually is generated in one of two ways. In the first, an Internet user typically generates a flame response to other posts or users posting on a site, and such a response is usually not constructive, does not clarify a discussion, and does not persuade others.

Encryption: the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

Firewall: is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

Phishing: is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Spambot: is an automated computer program designed to assist in the sending of spam.

Malware:  a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner’sinformed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code

Spyware: is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.

Virus: is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term “virus” is also commonly but erroneously used to refer to other types of malwareadware and spyware programs that do not have the reproductive ability.

Worm: computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program.

Trojan: also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine.

Viral Payload:

Zombie Computer: (often shortened as zombie) is a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction.

Intranet: is a private computer network that uses Internet technologies to securely share any part of an organization’s information or operational systems with its employees. Sometimes the term refers only to the organization’s internal website, but often it is a more extensive part of the organization’s computer infrastructure and private websites are an important component and focal point of internal communication and collaboration.

 

Week 5 Homework Definitions

Semantic Web: The Semantic Web is an evolving extension of the World Wide Web in which the semantics of information and services on the web is defined, making it possible for the web to understand and satisfy the requests of people and machines to use the web content. It derives from World Wide Web Consortium director Sir Tim Berners-Lee‘s vision of the Web as a universal medium for data,information, and knowledge exchange.

Metadata: may describe an individual datum, or content item, or a collection of data including multiple content items and hierarchical levels, for example a database schema. In data processing, metadata is definitional data that provides information about or documentation of other data managed within an application or environment

API: An application programming interface (API) is a set of routinesdata structuresobject classes and/or protocols provided by libraries and/oroperating system services in order to support the building of applications.

Mash-Up: A digital mashup is a digital media file containing any or all of text, graphics, audio, video and animation drawn from pre-existing sources, to create a new derivative work[1].

Scraping:

Search Spiders/Bots: is a program or automated script that browses the World Wide Web in a methodical, automated manner. any sites, in particular search engines, use spidering as a means of providing up-to-date data. Web crawlers are mainly used to create a copy of all the visited pages for later processing by a search engine that will index the downloaded pages to provide fast searches. 

SEO: Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a web site from search engines via “natural” (“organic” or “algorithmic”) search results. Typically, the higher a site’s “page rank” (i.e, the earlier it comes in the search results list), the more visitors it will receive from the search engine. 

Database: A database is a structured collection of records or data that is stored in acomputer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships.

“Web 2.0” The term “Web 2.0” describes the changing trends in the use of World Wide Web technology and web designthat aim to enhance creativity, communications, secure information sharing, collaboration and functionality of the web. Web 2.0 concepts have led to the development and evolution of web-culture communities and hosted services, such as social-networking sitesvideo sharing siteswikisblogs, and folksonomies

VOIP: is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephonyInternet telephonyvoice over broadband (VoBB), broadband telephony, and broadband phone.

Vlog: Video blogging, sometimes shortened to vlogging or vidblogging is a form of blogging for which the medium is video. Entries are made regularly and often combine embedded video or a video link with supporting text, images, and other metadata.


Week 4 Homework Definitions

Hexdecimal colour (Hex colour): The hexadecimal counting system consists of 16 unique symbols;

  • numbers from 0-9
  • letters from A-F

 

Counting in hexadecimal: 0 1 2 3 4 5 6 7 8 9 A B C D E F, where 0 is null and is the highest value.

Resolution: In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis. The sharpness of the image on a display depends on the resolution and the size of the monitor. The same pixel resolution will be sharper on a smaller monitor and gradually lose sharpness on larger monitors because the same number of pixels are being spread out over a larger number of inches.Information architecture

Web development: is a broad term for any activity related to developing a web site for the World Wide Web or an intranet. This can include e-commerce business developmentweb designweb content developmentclient-side/server-side scripting, and web server configuration.

Web design: requires conceptualizing, planning, modeling, and executing electronic media contentand its delivery via the Internet using technologies (such as markup languages) suitable for rendering and presentation by web browsers or other web-based graphical user interfaces (GUIs).

Web navigation: That which facilitates movement from one Web page to another Web page.


Week 3 Homework Definitions

Accessibility: refers to the practice of making websites usable by people of all abilities and disabilities. When sites are correctly designed, developed and edited, all users can have equal access to information and functionality.

Client-side programming: Client side programming is designed to add dynamic behavior to the client by executing a program on the browser.

Server-side programming: Server-side Programming discusses web enabling software, data integrationsoftware and the likes.

WYSIWYG editor:  is an acronym for What You See Is What You Get, used in computing to describe a system in which content displayed during editing appears very similar to the final output, which might be a printed document, web page, slide presentation or even the lighting for a theatrical event

Rich Internet Application: (RIAs) are web applications that have some of the characteristics of desktop applications, typically delivered by way ofproprietary web browser plug-ins or independently via sandboxes or virtual machines. Examples of RIA frameworks include Adobe Flash,Java/JavaFX and Microsoft Silverlight.

Dynamic content: is the “window” through which you view your content. One page is a virtual “bottomless pit” of information. It’s all made possible by serving up your content via a database rather than static HTML pages. 

 

Week 2 Homework Definitions

Hypertext: Any text within a document that is linked to another location. The other location could be within the same document, or a different document. Clicking hypertext with your mouse will activate the link. This glossary is made up of hypertext, containing many links.

Packet switching: A method of transferring data in a network where individual packets are accepted by the network and delivered to the prescribed destination. Packets can be distributed in any order because the control data sent at the beginning of the transmission ensures they are interpreted in the correct sequence once received. Because each packet carries its own instructions, it can use any route to reach its destination.

TCP/IP-TCP/IP is a protocol for computer networks. The Internet is largely built on top of TCP/IP (it is the more reliable of the two primary Internet Protocols — TCP stands for Transmission Control Protocol).IP address: A set of four numbers between 0 and 255, separated by periods, that specifies a location for the TCP/IP protocol.Bandwidth: the amount of data that can be transmitted via a given communications channel (eg, between a hard drive and the host PC) in a given unit of time.     Hosting Server: Hosting (also known as Web site hosting, Web hosting, and Webhosting) is the business of housing, serving, and maintaining files for one or more Web sites. More important than the computer space that is provided for Web site files is the fast connection to the Internet. Domain Name: Location of an entity on the Internet.

There are different levels of domains.
Examples of the various levels are as follows:

Top-level (TLD).com, .net, .org, .edu, .gov

2nd-levelbusiness, shopping, search
(2nd-level may contain letters, numbers, and hyphens)

3rd-levelwww1, www2, keyword (optional)
(NOTE – make sure your site resolves with or without www)

Caching: The storage of Web files for later re-use at a point more quickly accessed by the end user.

Caching can happen at many places, including proxies (i.e. the user’s ISP) and the user’s local machine. The objective is to make efficient use of resources and speed the delivery of content to the end user.

While caching can have a positive impact on the user’s experience, it can have a negative impact for site publishers, resulting in undercounts of page views and ad impressions. In response to this problem, sites have implemented various cache-busting techniques to better ensure that all performance statistics are accurately measured.

P2P: is an application that runs on a personal computer and shares files with other users across the internet. P2P networks work by connecting individual computers together to share files instead of having to go through a central server.

Browse: A Web browser, often just called a “browser,” is the program people use to access the World Wide Web. It interprets HTML code including text, images, hypertext links, Javascript, and Java applets. After rendering the HTML code, the browser displays a nicely formatted page. Some common browsers are Microsoft Internet Explorer, Netscape Communicator, and Apple Safari.


Week 1 Homework Definitions

Internet Internet: A computer “network” is a group of computers connected together to exchange data. When several networks are interconnected we have an “internet”. The global network of interconnected internets is “The Internet”

World Wide Web: A client-server information system that uses the Internet to access computers containing millions of hypertext documents.

Blog: A blog is a website where entries are made in journal style and displayed in a reverse chronological order.

IM: A catergory of Internet-based “chat” technologies that typically enable rapid text communication between two people. A key feature of IM is the ability to have a “buddy list” of friends or peers, and see at a glance which friends are available for chat. This capability is known as “presence”.

IM Language: Chat, E-Mail, Web, and chat room slang and acronyms.Example

AAS Alive And Smiling
ADN Any Day Now
AFAIK As Far As I Know

Social Network: The personal or professional set of relationships between individuals. Social networks represent both a collection of ties between people and the strength of those ties. Often used as a measure of social “connectedness”, recognising social networks assists in determining how information moves throughout groups, and how trust can be established and fostered.

User-centered: User Centered-Design (UCD) is a philosophy and a process. It is a philosophy that places the person (as opposed to the ‘thing’) at the center; it is a process that focuses on cognitive factors (such as perception, memory, learning, problem-solving, etc.) as they come into play during peoples’ interactions with things.

E-commerce: Any on-line transaction of buying and selling where business is done via Electronic Data Interchange (EDI).

E-Learning: Any learning that utilizes a network (LAN, WAN or Internet) for delivery, interaction, or facilitation. This would include distributed learning, distance learning (other than pure correspondence ), CBT delivered over a network, and WBT. Can be synchronous, asynchronous, instructor-led or computer-based or a combination.

Torrent: A torrent is a file sent via the BitTorrent protocol. It can be just about any type of file, such as a movie, song, game, or application. During the transmission, the file is incomplete and therefore is referred to as a torrent. Torrent downloads that have been paused or stopped cannot be opened as regular files, since they do not contain all the necessary data. However, they can often be resumed using a BitTorrent client, as long as the file is available from another server.

Torrents are different from regular downloads in that they are usually downloaded from more than one server at a time. The BitTorrent protocol uses multiple computers to transfer a single file, thereby reducing the bandwidth required by each server. When a torrent download is started, the BitTorrent system locates multiple computers with the file and downloads different parts of the file from each computer. Likewise, when sending a torrent, the server may send the file to multiple computers before it reaches the recipient. The result is a lower average bandwidth usage, which speeds up file transfers.

1 Response to “lexicon”


  1. stubbsonic's avatar 1 stubbsonic February 16, 2009 at 3:42 am

    Thanks Mario


Leave a comment





Design a site like this with WordPress.com
Get started