Skip to main content

Vocabulary

Vocabulary

List 1
PDF
Portable Document Format This is a file format developed by Adobe Systems in 1992. PDF captures formatting information from a variety of desktop publishing applications, making it possible to send formatted documents and have them appear on the recipient’s monitor or printer as they were intended. This is because a PDF will maintain the original fonts, images, graphics as well as the exact layout of the file.
Prototype
A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or created.
Innovation
A novel or a new improved: idea, device, product, lesson, etc, or the development thereof.
Computer
A computer is a programmable machine. A computer responds to a specific set of instructions in a well-defined manner and executes pre recorded instructions.
Server
A computer. A computer that awaits and responds to requests for data. Example: a DNS server awaits and responds to requests for urls to be translated to IP addresses
Internet
A groups of computers and servers that are connected to each other.
ISP:Internet Service Provider
An ISP is your gateway to the Internet and everything else you can do online; a company that provides subscribers access to the Internet. ISP. Examples: Verizon, ATT, Comcast, Spectrum (formerly Time Warne), Cox, Sprint. Two common types of ISPs are cable and DSL. Some providers may offer fiber optic connections.
DSL
Digital Subscriber Line A technology for bringing high- bandwidth information to homes and small businesses over ordinary copper telephone lines. xDSL refers to different variations of DSL, such as ADSL, HDSL, and RADSL. Learn more
Client
A computer that requests data stored on a server. Example: When you type an address into your browser, your computer is the client and it sends the request to the DNS server.
Web Server
  1. Computers on the Internet that deliver(store) web pages. Every web server has an IP address and possibly a domain.
  2. A program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their request, which are forwarded by their computers’ HTTP clients.
  3. Dedicated computer and appliances may be referred to as a Web servers as well.
How to build a dedicated web server: http://www.instructables.com/id/How-to-Build-a-Dedicated-Web-Server/
File server
A computer and storage device dedicated in storing files. Any user on the network can store files on the server.
Proxy server
A server that sits between a client application, such as a web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request ot the real server.
List 2
Cloud Computing
The practice of using a network of remote servers from data centers all over the world hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Cloud server hosting
Cloud server hosting is when hosting services are made available to customers on demand via the internet. Rather than being provided by a single server or virtual server, cloud server hosting services are provided by multiple connected servers that comprise a cloud.
Application server
A program that handles all application operations between users and an organization’s backend business applications or databases.
Dedicated Server
A single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers.
Print Server
A computer that manages one or more printers, and a network server is a computer that manages network traffic.
Database Server
A computer system that processes database queries.
Binary
A way of representing information using only two options, usually 0’s and 1’s.

Yes/No

True/False
Packets
Small chunks of information that have been carefully formed from larger chunks of information.
Protocol
A set of rules and standards used to communicate between machines.
HTTP
HyperText Transfer Protocol - the protocol used for transmitting web pages over the internet.
List 3
HTML
HTML HyperText Markup Language) is the language in which the content and formatting of a web page are written.
ASCII
American Standard Code for Information Interchange. ASCII is the university recognized raw text format that any computer can understand.
Net Neutrality
The principle that all Internet traffic should be treated equally by Internet Service Providers.
Bit
A contraction of “Binary Digit.” A bit is the single unit of information in a computer typically represented as 0 or 1.
Code (verb)
To write code, or to write instructions telling the computer what to do.
IETF
Internet Engineering Task Force - Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite.
ISOC
the Internet Society strives to make the world a better place.
URL
Uniform Resource Locator: An easy-to-remember address for calling a web page (like www.code.org). For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com.
Internet Protocol Stack
DNS, TCP, IP, and Physical Internet
Domain Name

Domain names are used to identify one or more IP addresses. For example, the domain name microsoft.com represents about a dozen IP addresses. Domain names are used in URLs to identify particular Web pages.

For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com.

Every domain name has a suffix that indicates which top level domain (TLD) it belongs to. There are only a limited number of such domains. For example:

  1. gov - Government agencies
  2. edu - Educational institutions
  3. org - Organizations (nonprofit)
  4. mil - Military
  5. com - commercial business
  6. net - Network organizations
  7. ca - Canada
  8. th - Thailand
DNS

Domain Name Server or Domain Name Service: The service that translates URLs to IP addresses.

  1. You type in a domain name
  2. The Domain Name Server (DNS) looks for the IP address with that name.
  3. You are directed to the correct Host Computer to view the site
TCP/IP
Transmission Control Protocol - Provides reliable, ordered, and error-checked delivery of stream of packets in the internet. TCP is tightly lightly linked with IP and usually seen as TCP/IP in writing.
List 4
IP Address
A number assigned to any item that is connected to the Internet.
Router
A device that forwards data packets along networks. A router is connected to at least two networks and are located at gateways.
Latency Time
Time it takes for a bit to travel from its sender to its receiver.
Bitrate
The number of bits that are conveyed or processed per unit of time.
Bandwidth

Transmission capacity measured by bit rate.

The speed of an Internet connection. A bandwidth of 5 mbps can process 5 megabytes, or 500 bytes, of digital information every second without slowing down or crashing.

Bandwidth can also be the amount of data you are allowed to send or receive in a network. Schools and businesses sometimes have bandwidth limits for their users to keep the network from slowing down.

See a sample Internet Bandwidth Guide

Bit
A contraction of “Binary Digit.” A bit is the single unit of information in a computer, typically represented as a 0 or 1.
Byte
A byte is a sequence of 8 bits processed as a single unit of information.
Why is byte 8 Bits?
A byte is 8 bits since it was used to refer to groups of 8-bits that a computer was processing.
Mbps
megabits per second Broadband speeds are measured in 'megabits per second', often shortened to Mb Mbits p/s or Mbps. Bits are tiny units of data, with a megabit representing a million of them. The higher the number of Mbps (megabits per second) you have, the speedier your online activity should be.
Heuristic
A problem solving approach (algorithm) to find a satisfactory solution where finding an optimal or exact solution is impractical or impossible
Lossless Compression
A data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
List 5
Abstraction
Reducing information to a simpler form, to remove some details to focus on essential characteristics. It is typically possible to look at a system at many levels of abstraction, depending on how many detail is necessary to approach the challenge at hand. To simplify things pulling out specific differences to make one solution work for multiple problems
File Sizes Bytes, KB, MB, GB ,TB
A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits).
File Sizes (2)
Put another way, a bit is either an ‘on’ or an ‘off’ which is processed by a computer processor, we represent ‘on’ as ‘1’ and ‘off’ as ‘0’. 8 bits are known as a byte, and it is bytes which are used to pass our information in its basic form - characters.
File Sizes (3)

A byte is a sequence of 8 bits (enough to represent one alphanumeric character) processed as a single unit of information. A single letter or character would use one byte of memory (8 bits), two characters would use two bytes (16 bits).

byte- A series of 8 binary bits that digitally represent a single character to the

computer. Example:

00000001 = 1 Learn more here.

kilobyte- Approximately 1,000 bytes. Learn more here.

megabyte- Approximately 1,000,000 bytes. Learn more here.

gigabyte - Approximately 1,000,000,000 bytes. Learn more here.

Internet Protocol Layers
DNS: Translates a URL into an IP address. Note that a DNS request still is conducted over TCP/IP

TCP: Breaks larger messages into multiple packets and ensures all packets are received and ordered correctly

IP: Assigns IP addresses to computers and routes packets of data to the correct address

The Physical Internet: copper telephone wire, fiber optic cable, radio waves, etc
Server
A computer that awaits and responds to requests for data. Example: a DNS server awaits and responds to requests for urls to be translated to IP addresses.
Client
A computer that requests data stored on a server. Example: When you type an address into your browser, your computer is the client and it sends the requests to the DNS server.
Lossy Compression
To save space, some information is thrown away
Resolution

The dimensions by which you can measure how many pixels are on a screen.

640 x 480

Metadata
Data that describes data. For example, a digital image may include metadata that describes the size of the image, number of colors, or resolution
List 6
Pixel
Short for “picture element” it is the fundamental unit of a digital image, typically a tiny square or dot which contains a single point of color of a larger image.
Hexadecimal Number System
A number system consisting of 16 distinct symbols - 0-9 and A-F - which can occur in each place value.
Favicon
Short for Favorite Icon
RGB
The RGB color model uses varying intensities of (R)ed, (G)reen, and (B)lue light are added together in to reproduce a broad array of colors.
Aggregantion
A computation in which rows from a data set are grouped together and used to compute a single value of more significant meaning or measurement. Common aggregations include: Average, Sum, Max, Min, Count. A Summary Table, Calculation Area.
Lossy Compression
(or irreversible compression) a data compression method that uses inexact approximations, discarding some data to represent the content. Most commonly seen in image formats like .jpg
Pivot Table
In spreadsheet software, it is the name of the tool used to create summary tables.
Summary Table
A table that shows the results of aggregations performed data from a larger data set
Boolean
A single value of either TRUE or FALSE
Boolean Expression
In programming, an expression that evaluates to TRUE or FALSE
List 7 programming
Computationally Hard
A “hard” problem for a computer is one in which it cannot arrive at a solution in a reasonable amount of time.
javascript
A programming language designed by Sun Microsystems that can be integrated into standard HTML pages to add some dynamic features. Learn more here.
Event Handling
An overarching term for the coding tasks involved in making a program respond to events by triggering functions.
UI Elements
On-screen objects, like buttons, images, text boxes, pull down menus, radio buttons, check boxes, screens,canvas, and so on.Input Controls: checkboxes, radio buttons, dropdown lists, list boxes, buttons, toggles, text fields, date field.
Expression
Any valid unit of code that resolves to a value.
Debugging
Finding and fixing problems in your algorithm or program.
==
The equality operator (sometimes read: “equal equal”) is used to compare two values, and returns to Boolean (true/false). Avoid confusion with the assignment operator “=”.
If-Statement
Dictates what portions of code can “see” or use a variable, typically derived from where the variable was first created. (See Global v. Local)
Conditionalst
Statements that only run under certain conditions
Selection
A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statements.
List 8
While Loop
A programming construct used to repeat a set of commands (loop) as long as (while) a boolean condition is true.
String
Any sequence of characters between quotation marks (ex: “hello”, “42”, “this is a string!”).
Event
An action that causes something to happen: click mouse, press a key, etc
Key Event
In JavaScript, an event triggered by pressing or releasing a key on the keyboard. For example: “keyup” and “keydown” are event types you can specify. Use event.key - from the “event” parameter of the onEvent callback function - to figure out which key was pressed.
Parameter
Categories. An extra piece of information that you pass to the function to customize it for a specific need.
Malware
Software that is intended to damage or disable computers, computer systems, and other software programs
For Loop
A typical looping construct designed to make it easy to repeat a section of code using a counter variable. The loop combines the creation of a variable, a boolean looping condition, and an update to the variable in one statement.
Modulo
A mathematical operation that returns the remainder after integer division. Example: 7 MOD 4 = 3
Documentation
A description of the behavior of a command, function, library, API, etc.
Canvas

A UI, user interface, element to use in HTML/JavaScript which acts as a digital canvas, allowing the programmer to draw on web pages, and manipulate pixels to draw basic shapes, figures and images.


In computer science and visualization, a canvas is a container that holds various drawing elements (lines, shapes, text, frames containing other elements, etc.). It takes its name from the canvas used in visual arts.

Moore’s Law
A prediction made by Gordon Moore in 1965 that computing power will double every 1.2-2 years, it has remained more or less true ever since.
List 9
Encryption
A process of encoding messages to keep them secret, so only authorized” parties can read it.
Cracking Encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to “crack” the encryption.
Public Key Encryption
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.
Asymmetric Encryption
Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.
Loop
The action of doing something over and over again.
Cipher
An algorithm that performs encryption or decryption. In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. ... When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext.
Cipher text
Ciphertext is encrypted text. Plaintext is what you have before encryption, and ciphertext is the encrypted result. The term cipher is sometimes used as a synonym for ciphertext, but it more properly means the method of encryption rather than the result.
Caesar Cipher
A technique for encryption that shifts the alphabet by some number of characters
Random Substitution Cipher
An encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
One-Pager
A business/corporate term for one-page document that summarizes a large, topic or plan.
API
A collection of routines, protocols, and commands to help a programmer create software applications.
List 10
Library
A collection of commands/functions, typically with a shared purpose.
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Function
A piece of code that you can easily call over and over again.
Selection
A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select, whether or not to run a certain block of statement.
If-Statement
The common programming structure that implements “conditional statements”.
List
A generic term for a programming data structure that hold multiple items.
Iterate
To repeat in order to achieve, or get closer to, a desired goal.
Conditionals
Statements that only run under certain conditions.
List 11
Models and Simulations
A program which replicates or mimics key features of a real world event in order to investigate its behavior without the cost, time, or danger of running and experiment in real life.
Event Listener (a loop)
A command that can be set up to trigger a function when particular type of event occurs on a particular UI element. An event listener is a procedure or function in a computer program that waits for an event to occur; that event may be a user clicking or moving the mouse, pressing a key on the keyboard, or an internal timer or interrupt. The listener is in effect a loop that is programmed to react to an input or signal.
Selection
A generic term for a type of programming statement (usually an if-statement) that uses a Boolean condition to determine, or select whether or not to run a certain block of statements.
Global Variable
A variable whose scope is “global” to the program, it can be used and updated by any part of the code. Its global scope is typically derived from the variable being declared (created) outside of any function, object, or method.
Event-Driven Program
A program designed to run blocks of code or functions in response to specified events (e.g. a mouse clock).
Local Variable
A variable with local scope is one that can only be seen, used and updated by code within the same scope. Typically this means the variable was declared (created) inside a function -- includes function parameter variables.
Concatenate
To link together or join. Typically used when joining together text Strings in programming (e.g. “hello, “+name).
User Interface
The visual elements of an program through which a user controls or communications the application. Often abbreviated UI.
Date Type
All values in programming language have a “type” - such as a Number, Boolean, String - that dictates how the computer will interpret it. For example 7+5 is interpreted differently from “7” + “5”.
List 12
Variable
A placeholder for a piece of information that can change.
Callback Function
A function specified as part of an event listener; it is written by the programmer but called by the system as the result of an event trigger.
Array
A data structure in JavaScript used to represent a list.
Return Value
A value sent back by a function to the place in the code where the function was called from - typically asking for value (e.g. getText(id)) or the result of calculation or computation of some kind.
Every Web Page Has Its Own URL
Examples https://www.techterms.com https://techterms.com/definition/internet
WiFi

Short for Wireless Fidelity, a way to connect to the Internet using radio waves to connect devices instead of using wires and cables.

Stands for "Wireless Fidelity" and it refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal.

Learn more here.
WiFi Hotspot
A location or spot where you can connect to a wireless network to the Internet.
Bluetooth
A wireless technology that enables communication between computer devices. It is primarily used for short range connections. Learn more here.
FIOS
Stands for "Fiber Optic Service" and it describes the use of fiber optic cables to transmit data via pulses of light. Learn more here.
4G
4G is a collection of fourth generation cellular data technologies.4G technologies are required to provide peak data transfer rates of at least 100 Mbps.
Algorithm
A step-by-step list of instructions that allows you to complete a task.
List 13
Spyware
Software that gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.
Mbps
Stands for "Megabits Per Second." One megabit is equal to one million bits or 1,000 kilobits. Mbps is used to measure data transfer speeds of high bandwidth connections, such as Ethernet and cable modems. While "megabit" sounds similar to "megabyte," a megabit is roughly one eighth the size of a megabyte (since there are eight bits in a byte).
Permalink
A permalink is the link to an individual blog post. You can Use the post name as the link display text.
https

https is 'hypertext transfer protocol SECURED'.


This means that the web page has a special layer of encryption added to hide your personal information and passwords.

browser

A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents.


The most popular web browsers in 2016 are: Google Chrome, Firefox, Internet Explorer, and Safari.

Phishing and Whaling
'Phishing' is what modern-day con men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens, phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says "you should log in and confirm this".
Addons and Plugins
Addons are custom software modifications. The user optionally installs addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.
Trojan
A trojan is a special kind of hacker program that relies on the user to welcome it and activates it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program.
Spamming and Filtering
'Spam' has two meanings.
  1. Spam can mean 'the rapid repetition of a keyboard command'. But more commonly,
  2. spam is the jargon name of 'unwanted/unsolicited email'. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords. Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, and then either deletes or quarantines messages that appear to be spam. Look for a 'spam' or 'junk' folder in your mailbox to see your quarantine of filtered email.
Cloud Computing and Software-as-a-Service (SaaS)
Cloud computing is a fancy term to describe that your software is online and 'borrowed', instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users' email is all stored and accessed 'in the cloud' of the Internet, and not actually on their own computers. This is the modern version of the 1970's mainframe computing model. As part of the cloud computing model, 'Software as a Service' is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet and log into their online rented copies of their SaaS software.
Enter text

Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas ('ciphers') to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the public Internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. On the provision that reliable encryption is in place, your banking information and credit card numbers are kept private.

Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are.

List 14
Ports and Port Forwarding

'Network ports' are thousands of tiny electronic 'lanes' that comprise your network connection. Every computer has 65,536 tiny ports, through which Internetworking data travels in and out. By using port management tools like a hardware router, users can control port access to better safeguard themselves against hackers.

'Port forwarding' is the semi-complex technique of opening specific network ports. You would port-forward to speed up your downloading and speed up your online connections for gaming and teleconferencing.

Firewall

Firewall is a generic term to describe 'a barrier against destruction'. It comes from the building term of a protective wall to prevent the spreading of house fires or engine compartment fires. In the case of computing, 'firewall' means to have software and/or hardware protecting you from hackers and viruses.


Computing firewalls range from small antivirus software packages to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system.

Archives

Archives and Archiving A computer 'archive' is one of two things: a compressed container of multiple smaller data files, or a purposeful long-term storage of files that are not going to be used often. In some cases, an archive can be both.


The act of 'archiving', similarly, is one of two things: to combine and squeeze multiple files into a larger single file (for easier emailing); or, archiving is when you will retire data and documents to be put into long-term storage (e.g. your thousands of old emails in your inbox).

Bug
A bug is an error in a program that stops it from working in the way it should.
Debugging
Debugging is the process of going through a program’s code to locate and fix a problem or mistake.
Pin
Do_not_delete_blank=copy
XML
XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following:
XHTML is a combination of HTML and XML
IM
Instant messaging I.M. (usually spelled 'IM' without the periods) is instant messaging, a form of modern online chatting. IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer. That IM software, in turn, connects you to potentially thousands of other IM users through the Internet. You locate existing friends and make new friends by searching for their IM nicknames.
P2P

peer-to-peer - Also known as "P2P". In a network the "peers" and separate

computer systems that are connected through the internet allowing files to be

shared directly from one computer system to the other without a central server.

P2P file sharing ('peer-to-peer') is the most voluminous Internet activity today. P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other.


Through 'uploading' and 'downloading', users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pastime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P.

Read more about the controversial world of P2P file sharing...

Plugins

Plugins are a special kind of web browser addon. Plugins are essentially required addons if you wish to view very specialized web pages.

Examples include: Adobe Flash Player or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.

Intranet
intranet - An internal or private network that is only available in one geographic location.
MP3
A popular compressed file format for digital music downloads.
Doc, Docx

DOC - The file extension for a Microsoft Word Document. Note that in more recent

versions of MS Word (after 2007) the file extension is DOCX.

List 15
Webcam
webcam - A video camera used to broadcast streaming or still video using the internet.
Operating system
The software that communicates with the hardware and allows other programs to run. (such as Windows XP, Windows 7, Apple OS X)
Spam
spam - Unwanted and unsolicited "junk" email or irrelevant postings to a newsgroup or blog
Gateway

A gateway is either hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers. For example, when you send an e-mail to a friend or when you log in to a Web site, there is a gateway that allows the connection take place. Often, your connection to a Web site will involve many smaller connections to other servers along the way. In these cases, a number of gateways are used.

In a completely unrelated story, Gateway is also the name of a popular direct-order PC manufacturer.

Identity theft
Do_not_delete_blank=copy
404 Not Found Error
The HTTP 404 Not Found Error means that the webpage you were trying to reach could not be found on the server. It is a Client-side Error which means that either the page has been removed or moved and the URL was not changed accordingly, or that you typed in the URL incorrectly.
website
A location connected to the Internet that maintains one or more pages on the World Wide Web.
Domain Name Suffix

A domain suffix is the last part of a domain name and is often referred to as a "top-level domain" or TLD. Popular domain suffixes include ".com," ".net," and ".org," but there are dozens of domain suffixes approved by ICANN.

Each domain suffix is intended to define the type of website represented by the domain name. For example, ".com" domains are meant for commercial websites, whereas ".org" domains are to be used by organizations. However, since any entity can register domain names with these suffixes, the domain suffix does not always represent the type of website that uses the domain name. For example, many individuals and organizations register ".com" domain names for non-commercial purposes, since the ".com" domain is the most recognized.

cache
The cache is a space in your computer's hard drive and in RAM memory where your browser saves copies of previously visited Web pages. Your browser uses the cache like a short-term memory.
Website cookie

Example from ISTE site: “This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.”

“Accept Decline”

An HTTP cookie (usually just called a cookie) is a simple computer file made of text. The information stored in cookies can be used to personalise the experience when using a website. A website can use cookies to find out if someone has visited a website before and record information (data) about what they did.

A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information about you, similar to a preference file created by a software application.

While cookies serve many functions, their most common purpose is to store login information for a specific site. Some sites will save both your username and password in a cookie, while others will only save your username. Whenever you check a box that says, "Remember me on this computer," the website will generate a login cookie once you successfully log in. Each time you revisit the website, you may only need to enter your password or you might not need to log in at all.

https://www.commoncraft.com/video/website-cookies

https://www.computerhope.com/jargon/c/cookie.htm

https://en.wikipedia.org/wiki/HTTP_cookie

Comments

Post a Comment