Sie sind auf Seite 1von 13

Internet

Terms:
1. Active Server Page (ASP)
This is a Web page that has one or more ASP scripts embedded in it. ASP scripts are like small computer programs that run when an ASPbased Web page is accessed. You can tell if you're accessinganactiveserverpageifthesuffixoftheURLis".asp"(asopposedto".html").ASPpages areprocessedonaWebserverbeforetheyaretransferredtoauser'sWebbrowser.ASPpagesare typicallyusedforpagesthathavedynamicorfrequentlychanginginformation.Forexample,anASP scriptmightgetavisitor'szipcodethroughaformonaWebpage,andthencustomizethecontent ontheresultingpagebasedonthatinformation.SinceASPtechnologywasdesignedbyMicrosoft, ASPscriptsaretypicallywritteninMicrosoft'sVisualBasicprogramminglanguage.

2. ASP.NET
ASP.NETisasetofWebdevelopmenttoolsofferedbyMicrosoft.ProgramslikeVisualStudio.NET and Visual Web Developer allow Web developers to create dynamic websites using a visual interface. Of course, programmers can write their own code and scripts and incorporate it into ASP.NET websites as well. Though it often seen as a successor to Microsoft's ASP programming technology, ASP.NET also supports Visual Basic.NET, JScript .NET and opensource languages like PythonandPerl. ASP.NETisbuiltonthe.NETframework,whichprovidesanapplicationprograminterface(API)for softwareprogrammers.The.NETdevelopmenttoolscanbeusedtocreateapplicationsforboththe WindowsoperatingsystemandtheWeb.ProgramslikeVisualStudio.NETprovideavisualinterface for developers to create their applications, which makes .NET a reasonable choice for designing Webbasedinterfacesaswell.

3. Ajax
Ajax is a combination of Web development technologies used for creating dynamic websites. Ajax stands for "Asynchronous JavaScript And XML." Therefore, websites that use Ajax combine JavaScriptandXMLtodisplaydynamiccontent.The"asynchronous"partofAjaxreferstotheway requests are made to the Web server. When a script sends a request to the Web server, it may receivedata,whichcanthenbedisplayedontheWebpage.Sincetheseeventshappenatslightly different times, they are considered to be asynchronous. The data is usually sent back to the browserinanXMLformat,sinceitiseasytoparse. WhatmakesAjaxsopowerfulisthatscriptscanrunontheclientside,ratherthanontheserver.This means a JavaScript function can make a request to a server after a webpage has already finished loading.Thedatareceivedfromtheservercanthenbedisplayedonthepagewithoutreloadingthe othercontent.IfaserversidescriptinglanguagelikePHPorASPwasused,theentirepagewould needtobereloadedinorderforthenewcontenttobedisplayed.

4. Apache
Apache is the most popular Web server software. It enables a computer to host one or more websitesthatcanbeaccessedovertheInternetusingaWebbrowser.ThefirstversionofApache wasreleasedin1995bytheApacheGroup. Apache'spopularityintheWebhostingmarketislargelybecauseitisopensourceandfreetouse.

5. BitTorrent
BitTorrentisapeertopeer(P2P)filesharingprotocoldesignedtoreducethebandwidthrequiredto transferfiles.Itdoesthisbydistributingfiletransfersacrossmultiplesystems,therebylesseningthe averagebandwidthusedbyeachcomputer.Forexample,ifauserbeginsdownloadingamoviefile, theBitTorrentsystemwilllocatemultiplecomputerswiththesamefileandbegindownloadingthe

filefromseveralcomputersatonce.SincemostISPsoffermuchfasterdownloadspeedsthanupload speeds,downloadingfrommultiplecomputerscansignificantlyincreasethefiletransferrate. Inorder tousetheBitTorrent protocol,youneeda BitTorrent client,whichisasoftwareprogram that accesses the BitTorrent network. The client program allows you to search for files and begin downloading torrents, which are inprogress downloads. Most BitTorrent clients allow you to resumetorrentsthathavebeenpausedorstopped.

6. BLOG
Shortfor"WebLog,"thistermreferstoalistofjournalentriespostedonaWebpage.Anybodywho knows how to create and publish a Web page can publish their own blog. Some Web hosts have made it even easier by creating an interface where users can simply type a text entry and hit "publish"topublishtheirblog. Becauseofthesimplicityofcreatingablog,manypeoplehavefoundanewpresenceontheWeb. Instead of writing confidential entries in a book that no one is supposed to see, people now can sharetheirpersonalfeelingsandexperienceswiththousandsofpeoplearoundtheworld.Blogsare typicallyupdateddaily,monthly,oranywhereinbetween.

7. Bookmark
Similartoareallifebookmark,anInternetbookmarkactsasamarkerforaWebsite.(InInternet Explorer,they'recalled"Favorites".)WhenusingaWebbrowser,youcansimplyselectabookmark fromthebrowser'sBookmarksmenutogotoacertainsite.Thisway,youdon'thavetogothrough theredundantprocessoftypingintheInternetaddresseachtimeyouvisitoneofyourfavoritesites.

8. Broadband
Thisreferstohighspeeddatatransmissioninwhichasinglecablecancarryalargeamountofdata atonce.ThemostcommontypesofInternetbroadbandconnectionsarecablemodems(whichuse thesameconnectionascableTV)andDSLmodems(whichuseyourexistingphoneline).Becauseof its multiple channel capacity, broadband has started to replace baseband, the singlechannel technologyoriginallyusedinmostcomputernetworks.

9. Captcha
It may also be written "CAPTCHA," which is an acronym for "Completely Automated Public Turing testtotellComputersandHumansApart."Acaptchaisprogramusedtoverifythatahuman,rather thanacomputer,isenteringdata.Captchasarecommonlyseenattheendofonlineformsandask theusertoentertextfromadistortedimage.Thetextintheimagemaybewavy,havelinesthrough it,ormaybehighlyirregular,makingitnearlyimpossibleforanautomatedprogramtorecognizeit. Fortunately,mostcaptchasallowtheusertoregeneratetheimageifthetextistoodifficulttoread. Someevenincludeanauditorypronunciationfeature.Byrequiringacaptcharesponse,webmasters canpreventautomatedprograms,or"bots,"fromfillingoutformsonline.Thispreventsspamfrom being sent through website forms and ensures that wikis, such as Wikipedia, are only edited by humans.Thename"captcha"comesfromtheword"capture,"sinceitcaptureshumanresponses.

10. Client
Intherealworld,businesseshaveclients.Inthecomputerworld,servershaveclients.The"client server"architectureiscommoninbothlocalandwideareanetworks.Forexample,ifanofficehasa serverthatstoresthecompany'sdatabaseonit,theothercomputersintheofficethatcanaccess thedatabaseare"clients"oftheserver.Onalargerscale,whenyouaccessyouremailfromamail serverontheInternet,yourcomputeractsastheclientthatconnectstothemailserver.

11. Cloud Computing


Cloud computing refers to applications and services offered over the Internet. These services are offeredfromdatacentersallovertheworld,whichcollectivelyarereferredtoasthe"cloud."This metaphorrepresentstheintangible,yetuniversalnatureoftheInternet. Theideaofthe"cloud"simplifiesthemanynetworkconnectionsandcomputersystemsinvolvedin onlineservices.Infact,manynetworkdiagramsusetheimageofacloudtorepresenttheInternet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internetconnectioncanaccessthecloudandtheservicesitprovides.Sincetheseservicesareoften connected,userscanshareinformationbetweenmultiplesystemsandwithotherusers. Examples of cloud computing include online backup services, social networking services, and personaldataservicessuchasApple'sMobileMe.Cloudcomputingalsoincludesonlineapplications, suchasthoseofferedthroughMicrosoftOnlineServices.

12. Cyberbullying
Therearebulliesandthentherearecyberbullies.Whilebullyingtypicallyhappensatschoolorwork, cyberbullying takes place over cyberspace. This includes both Internet and cell phone communication. Like physical bullying, cyberbullying is aimed at younger people, such as children and teenagers. It may involve harassing, threatening, embarrassing, or humiliating young people online.Technically,cyberbullyingtakesplacebetweentwoyoungpeople.Whenadultsareinvolved, itmaybecalledcyberharassmentorcyberstalking.

13. Cyberspace
Unlikemostcomputerterms,"cyberspace"doesnothaveastandard,objectivedefinition.Instead,it isusedtodescribethevirtualworldofcomputers.Forexample,anobjectincyberspacereferstoa block of data floating around a computer system or network. With the advent of the Internet, cyberspace now extends to the global network of computers. So, after sending an email to your friend,youcouldsayyousentthemessagetoherthroughcyberspace.

14. Cybersquatters
IntheearlydaysoftheUnitedStates,pioneerstravelledwestandclaimedfederallandastheirown. Thesepeoplewerecalled"squatters,"sincetheyclaimedrightstothelandsimplybyoccupyingit. ManyearlyInternetuserssawthepotentialvalueofprominentdomainnamesandbegantoregister asmanydomainsastheycould.Overthecourseofafewyears,nearlyallcommon"dotcoms"were registered. Many of these domain names were registered for investment purposes, rather than beingusedforlegitimatewebsites.Thispracticesoonbecameknownas"cybersquatting."

15. Dialup
DialupreferstoanInternetconnectionthatisestablishedusingamodem.Themodemconnectsthe computertostandardphonelines,whichserveasthedatatransfermedium.Whenauserinitiatesa dialup connection, the modem dials a phone number of an Internet Service Provider (ISP) that is designated to receive dialup calls. The ISP then establishes the connection, which usually takes abouttensecondsandisaccompaniedbyseveralbeepingandbuzzingsounds. Afterthedialupconnectionhasbeenestablished,itisactiveuntiltheuserdisconnectsfromtheISP. Typically, this is done by selecting the "Disconnect" option using the ISP's software or a modem utility program. However, if a dialup connection is interrupted by an incoming phone call or someonepickingupaphoneinthehouse,theservicemayalsobedisconnected.Intheearlyyears oftheInternet,especiallyinthe1990s,adialupconnectionwasthestandardwaytoconnecttothe Internet.

16. Direct Digital Marketing (DDM)


Alsoknownas"DDM,"isatypeofmarketingthatisdoneexclusivelythroughdigitalmeans.Itmay be used to supplement or even replace traditional physical marketing strategies. The primary channelsofdirectdigitalmarketingincludeemailandtheWeb. TheWebisanotherpopularmediumfordirectdigitalmarketing.Manycompaniesnowadvertiseon websitesthroughbannerads,textlinks,andothertypesofadvertisements.ByusingWebmarketing, companiescandrivevisitorsdirectlytotheirwebsitewithasingleclick.

17. Domain Name System (DNS)


TheprimarypurposeofDNSistokeepWebsurferssane.WithoutDNS,wewouldhavetoremember theIPaddressofeverysitewewantedtovisit,insteadofjustthedomainname.Canyouimagine having to remember "17.254.3.183" instead of just "apple.com"? The reason the Domain Name SystemisusedisbecauseWebsitesareacutallylocatedbytheirIPaddresses.Forexample,when youtypein"http://www.adobe.com," thecomputerdoesn'timmediatelyknowthatitshouldlook forAdobe'sWebsite.Instead,itsendsarequesttothenearestDNSserver,whichfindsthecorrect IP address for "adobe.com." Your computer then attempts to connect to the server with that IP number.

18. DNS records


TheyarestoredinzonefilesandareusedfortranslatingdomainnamestoIPaddresses.Theyalso containotherdata,includingthedomainname'snameserverandmailserverinformation.Ifthere aredomainnamealiases,suchasthecommonlyused"www"precedingthedomainname,thesewill alsobelistedintheDNSrecord. SinceDNSrecordsaremadeupentirelyoftext,theyareeasytomodifywhenneeded.However,one smalltypocouldredirectadomainnametothewrongWebserverorpreventitfromshowingupat all.ThisiswhyitisimportanttoenterDNSinformationaccuratelyanddoublecheckyourchanges entrybeforesavingthezonefile.

19. Domain Name


This is the name that identifies Web site. For example, "microsoft.com" is the domain name of Microsoft's Web site. A single Web server can serve Web sites for multiple domain names, but a singledomainnamecanpointtoonlyonemachine.Forexample,AppleComputerhasWebsitesat www.apple.com,www.info.apple.com,andstore.apple.com.Eachofthesesitescouldbeservedon differentmachines.

20. Domain Suffix


Adomainsuffixisthelastpartofadomainnameandisoftenreferredtoasa"topleveldomain"or TLD. Popular domain suffixes include ".com," ".net," and ".org," but there are dozens of domain suffixesapprovedbyICANN. Eachdomainsuffixisintendedtodefinethetypeofwebsiterepresentedbythedomainname.For example, ".com" domains are meant for commercial websites, whereas ".org" domains are to be usedbyorganizations.

21. Download
Thisistheprocessinwhichdataissenttoyourcomputer.Wheneveryoureceiveinformationfrom theInternet,youaredownloadingittoyourcomputer.Forexample,youmighthavetodownloadan upgradeforyourcomputer'soperatingsysteminordertoplayanewgame.Oryoumightdownload ademoversionofaprogramyouarethinkingaboutbuyingfromthesoftwarecompany'sWebsite. Theoppositeofthisprocess,sendinginformationtoanothercomputer,iscalleduploading.

22. Dynamic websites


TheycontainWebpagesthataregeneratedinrealtime. These pagesincludeWebscriptingcode, suchasPHPorASP.Whenadynamic pageisaccessed,thecodewithin the pageisparsedonthe WebserverandtheresultingHTMLissenttotheclient'sWebbrowser. Most large websites are dynamic, since they are easier to maintain than static websites. This is becausestaticpageseachcontainuniquecontent,meaningtheymustbemanuallyopened,edited, andpublishedwheneverachangeismade.Dynamicpages,ontheotherhand,accessinformation fromadatabase.Therefore,toalterthecontentofadynamicpage,thewebmastermayonlyneed to update a database record. This is especially helpful for large sites that contain hundreds or thousandsofpages.Italsomakesitpossibleformultipleuserstoupdatethecontentofawebsite withouteditingthelayoutofthepages.

23. Ecommerce (electroniccommerce)


EcommercemeantodobusinessovertheInternet.WebsitessuchasAmazon.com,Buy.com,and eBayareallecommercesites.ThetwomajorformsofecommerceareBusinesstoConsumer(B2C) andBusinesstoBusiness(B2B).WhilecompanieslikeAmazon.comcatermostlytoconsumers,other companiesprovidegoodsandservicesexclusivelytootherbusinesses.

24. EMail
EmailispartofthestandardTCP/IPsetofprotocols.SendingmessagesistypicallydonebySMTP (SimpleMailTransferProtocol)andreceivingmessagesishandledbyPOP3(PostOfficeProtocol3), orIMAP(InternetMessageAccessProtocol).IMAPisthenewerprotocol,allowingyoutoviewand sortmessagesonthemailserver,withoutdownloadingthemtoyourharddrive. Though email was originally developed for sending simple text messages, it has become more robust in the last few years. Now, HTMLbased email can use the same code as Web pages to incorporateformattedtext,colours,andimagesintothemessage.Also,documentscanbeattached to email messages, allowing files to be transferred via the email protocol. However, since email wasnotoriginallydesignedtohandlelargefiletransfers,transferringlargedocuments(over3MB, forexample)isnotallowedbymostmailservers.Soremembertokeepyourattachmentssmall!

25. Firewall
IntheITworld,firewallsdonotinvolveanyfireorpyrotechnics,buttheyserveasimilarpurpose.A computerfirewalllimitsthedatathatcanpassthroughitandprotectsanetworkedserverorclient machinefromdamagebyunauthorizedusers. Firewalls can be either hardware or softwarebased. A router is a good example of a hardware device that has a builtin firewall. Most routers can be configured to limit traffic from certain IP addresses or block requests based on other criteria. Software programs that monitor and restrict externalaccesstoacomputerornetworkcanalsoserveasfirewalls.Anetworkfirewallonlyallows authorizedtrafficfromtheInternettoflowinandoutofthenetwork.

26. File Transfer Protocol (FTP)


It is a common method of transferring files via the Internet from one computer to another. Some commonFTPprogramsare"Fetch"fortheMac,and"WS_FTP"forWindows.However,youcanalso useaWebbrowserlikeNetscapeorInternetExplorertoaccessFTPservers.Todothis,youneedto typetheURLoftheserverintothelocationfieldofthebrowser.ManyFTPserversare"anonymous FTP"serverswhichmeansyoucanloginwiththeusername"anonymous"andyouremailaddress asthepassword.OtherFTPserversrequireaspecificlogininordertoaccessthefiles.

27. Gateway
Agatewayiseitherhardwareorsoftwarethatactsasabridgebetweentwonetworkssothatdata can be transferred between a number of computers. For example, when you send an email to a

friendorwhenyoulogintoaWebsite,thereisagatewaythatallowstheconnectiontakeplace. Often,yourconnectiontoaWebsitewillinvolvemanysmallerconnectionstootherserversalong theway.Inthesecases,anumberofgatewaysareused.

28. HTTP
Standsfor"HyperTextTransferProtocol."ThisistheprotocolusedtotransferdataovertheWorld WideWeb.That'swhyallWebsiteaddressesbeginwith"http://".WheneveryoutypeaURLinto yourbrowserandhitEnter,yourcomputersendsanHTTPrequesttotheappropriateWebserver. TheWebserver,whichisdesignedtohandleHTTPrequests,thensendstoyoutherequestedHTML page.

29. HTTPS
Stands for "HyperText Transport Protocol Secure." HTTPS is the same thing as HTTP, but uses a secure socket layer (SSL) for security purposes. Some examples of sites that use HTTPS include bankingandinvestmentwebsites,ecommercewebsites,andmostwebsitesthatrequireyoutolog in. WebsitesthatusethestandardHTTP protocoltransmitandreceivedatainanunsecuredmanner. Thismeansitispossibleforsomeonetoeavesdroponthedatabeingtransferredbetweentheuser andtheWebserver.Whilethisishighlyunlikely,itisnotacomfortingthoughtthatsomeonemight be capturing your credit card number or other personal information that you enter on a website. Therefore, secure websites use the HTTPS protocol to encrypt the data being sent back and forth withSSLencryption.IfsomeoneweretocapturethedatabeingtransferredviaHTTPS,itwouldbe unrecognizable.

30. Hyperlink:
Ahyperlinkisaword,phrase,orimagethatyoucanclickontojumptoanewdocumentoranew sectionwithinthecurrentdocument.HyperlinksarefoundinnearlyallWebpages,allowingusersto clicktheirwayfrompagetopage.Texthyperlinksareoftenblueandunderlined,butdon'thaveto be. When you move the cursor over a hyperlink, whether it is text or an image, the arrow should change to a small hand pointing at the link. When you click it, a new page or place in the current pagewillopen.

31. Internet
Believe it or not, the Internet was created way back in 1969, during the Cold War, by the United States military. It was meant to be a "nukeproof" communications network. Today, the Internet spreads across the globe and consists of countless networks and computers, allowing millions of peopletoshareinformation.DatathattravelslongdistancesontheInternetistransferredonhuge lines known collectively as the Internet backbone. The Internet is now maintained by the major Internet service providers such as MCI Worldcom, Sprint, GTE, ANS, and UUNET. Because these providers make huge amounts of revenue off the Internet, they are motivated to maintain consistentandfastconnectionswhichbenefitseverydayInternetuserslikeyouandme. Many people think the Internet and the World Wide Web are the same thing. They're not! The WorldWideWebiswhatyouarebrowsingrightnow.ItisoneofthemanyfeaturesoftheInternet. Email,FTP,andInstantMessagingarealsofeaturesoftheInternet.

32. Internet Protocol (IP)


ItprovidesastandardsetofrulesforsendingandreceivingdatathroughtheInternet.Peopleoften usetheterm"IP"whenreferringtoanIPaddress,whichisOK.Thetwotermsarenotnecessarily synonymous,butwhenyouaskwhatsomebody'sIPis,mostpeoplewillknowthatyouarereferring totheirIPaddress.

33. IP Address
Alsoknown asan"IPnumber"orsimplyan "IP," thisisacode madeupof numbersseparatedby three dots that identifies a particular computer on the Internet. Every computer, whether it be a Web server or the computer you're using right now, requires an IP address to connect to the Internet. IPaddressesconsistoffoursetsofnumbersfrom0to255,separatedbythree dots.For example "66.72.98.236" or "216.239.115.148". Your Internet Service Provider (ISP) will assign you eitherastaticIPaddress(whichisalwaysthesame)oradynamicIPaddress(whichchangesevery time you log on). ISPs typically assign dialup users a dynamic IP address each time they sign on becauseitreducesthenumberofIPaddressestheymustregister.

34. IPv4
ItisthemostwidelyusedversionoftheInternetProtocol.ItdefinesIPaddressesina32bitformat, which looks like 123.123.123.123. Each threedigit section can include a number from 0 to 255, whichmeansthetotalnumberofIPv4addressesavailableis4,294,967,296(256x256x256x256or 2^32).

35. IPv6
EverycomputersystemanddeviceconnectedtotheInternetislocatedbyanIPaddress.Thecurrent system of distributing IP addresses is called IPv4. This system assigns each computer a 32bit numeric address, such as 120.121.123.124. However, with the growth of computers connected to theInternet,thenumberofavailableIPaddressesarepredictedtorunoutinonlyafewyears.This iswhyIPv6wasintroduced. IPv6,alsocalledIPng(orIPNextGeneration),isthenextplannedversionoftheIPaddresssystem. (IPv5 was an experimental version used primarily for streaming data.) While IPv4 uses 32bit addresses, IPv6 uses 128bit addresses, which increases the number of possible addresses by an exponential amount. For example, IPv4 allows 4,294,967,296 addresses to be used (2^32). IPv6 allowsforover340,000,000,000,000,000,000,000,000,000,000,000,000IPaddresses.Thatshouldbe enoughtolastawhile. Because IPv6 allows for substantially more IP addresses than IPv4, the addresses themselves are morecomplex.Theyaretypicallywritteninthisformat: hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh Each "hhhh" section consists of a fourdigit hexadecimal number, which means each digit can be from0to9andfromAtoF.AnexampleIPv6addressmaylooklikethis: F704:0000:0000:0000:3458:79A2:D08B:4320 36. ISDN Standsfor"IntegratedServicesDigitalNetwork."ISDNisadatatransfertechnology,createdin1984, that can transfer data significantly faster than a dialup modem. ISDN enables widebandwidth digitaltransmissionoverthepublictelephonenetwork,whichmeansmoredatacanbesentatone time.AtypicalISDNconnectioncansupporttransferratesof64Kor128Kofdatapersecond.While thesespeedsarefasterthanwhatyoucangetwithadialupmodem,thenewerDSLtechnologycan supportevenfastertransferratesandislesscostlytosetupandmaintain.

37. ISP
Standsfor"InternetServiceProvider."InordertoconnecttotheInternet,youneedanISP.Itisthe companythatyou(oryourparents)payamonthlyfeetoinordertousetheInternet.Ifyouusea dialupmodemtoconnecttoyourISP,apointtopointprotocol(PPP)connectionisestablishedwith another modem on the ISP's end. That modem connects to one of the ISP's routers, which routes youtotheInternet"backbone."Fromthere,youcanaccessinformationfromanywherearoundthe world.DSLandcablemodemsworkthesameway,exceptafteryouconnectthefirsttime,youare alwaysconnected.

38. Link
When you are browsing the Web and you see a highlighted and underlined word or phrase on a page,thereisagoodchanceyouarelookingatalink.Byclickingonalink,youcan"jump"toanew WebpageoracompletelydifferentWebsite.Whiletextlinksaretypicallyblueandunderlined,they canbeanycoloranddon'thavetobeunderlined.ImagescanalsoserveaslinkstootherWebpages. WhenyoumovethecursoroveralinkinaWebpage,thearrowwillturnintoalittlehand,letting youknowthatitisalink.Theterm"hypertext"comesfromthewaylinkscanquicklysendyouto anotherWebdestination.

39. Phishing
Itissimilartofishinginalake,butinsteadoftryingtocapturefish,phishersattempttostealyour personalinformation.Theysendoutemailsthatappeartocomefromlegitimatewebsitessuchas eBay, PayPal, or other banking institutions. The emails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link includedintheemail.Someemailswillaskthatyouenterevenmoreinformation,suchasyourfull name, address, phone number, social security number, and credit card number. However, even if youvisitthefalsewebsiteandjustenteryourusernameandpassword,thephishermaybeableto gainaccesstomoreinformationbyjustloggingintoyouraccount.

40. PHP
Stands for "Hypertext Preprocessor." (It is a recursive acronym, if you can understand what that means.)PHPisanHTMLembeddedWebscriptinglanguage.ThismeansPHPcodecanbeinserted intotheHTMLofaWebpage.WhenaPHPpageisaccessed,thePHPcodeisreador"parsed"bythe serverthepageresideson.TheoutputsfromthePHPfunctionsonthepagearetypicallyreturnedas HTML code, which can be read by the browser. Because the PHP code is transformed into HTML beforethepageisloaded,userscannotviewthePHPcodeonapage.ThismakePHPpagessecure enoughtoaccessdatabasesandothersecureinformation. AlotofthesyntaxofPHPisborrowedfromotherlanguagessuchasC,JavaandPerl.However,PHP hasanumberofuniquefeaturesandspecificfunctionsaswell.Thegoalofthelanguageistoallow Web developers to write dynamically generated pages quickly and easily. PHP is also great for creatingdatabasedrivenWebsites.

41. Portal
Internet portal is a Web site that acts as a starting point for browsing the Web. Portals typically include search engines and large directories of websites. Some popular portals are Yahoo, Excite, Lycos, Netscape, AltaVista, MSN, and AOL.com. There are also many smaller portals, known as "niche portals," for specific interests. These sites include C|net (for computers and technology), Fool.com(forinvestors),andGarden.com(forgardeners). MostlargeportalshavemillionsofWebpagesindexedforvisitorstosearchthough.Theyalsohave large directories of Web sites, which are categorized by topic. Though the primary purpose of a portalistofindothersitesforyou,manynowincludealotofinformationwithintheirownsites.

42. Protocol
When computers communicate with each other, there needs to be a common set of rules and instructionsthateachcomputerfollows.Aspecificsetofcommunicationrulesiscalledaprotocol. Becauseofthemanywayscomputerscancommunicatewitheachother,therearemanydifferent protocols too many for the average person to remember. Some examples of these different protocolsincludePPP,TCP/IP,SLIP,HTTP,andFTP.

43. Search Engine


Google, Excite, Lycos, AltaVista, Infoseek, and Yahoo are all search engines. They index millions of sitesontheWeb,sothatWebsurferslikeyouandmecaneasilyfindWebsiteswiththeinformation wewant.By creatingindexes,orlarge databasesofWebsites (basedontitles,keywords,andthe textinthepages),searchenginescanlocaterelevantWebsiteswhenusersentersearchtermsor phrases.Whenyouarelookingforsomethingusingasearchengine,itisagoodideatousewords likeAND,OR,andNOTtospecifyyoursearch.Usingthesebooleanoperators,youcanusuallygeta listofmorerelevantsites.

44. Search Engine Optimization (SEO)


Justabouteverywebmasterwantshisorhersitetoappearinthetoplistingsofallthemajorsearch engines.Say,forexample,thatBobrunsanonlinesoccerstore.Hewantshissitetoshowupinthe topfewlistingswhensomeonesearchesfor"soccer shoes."Thenhegetsmoreleadsfrom search engines, which means more traffic, more sales, and more revenue. The problem is that there are thousands of other soccer sites, whose Webmasters are hoping for the same thing. That's where searchengineoptimization,orSEO,comesin. SEOinvolvesanumberofadjustmentstotheHTMLofindividualWebpagestoachieveahighsearch engineranking.First,thetitleofthepagemustincluderelevantinformationaboutthepage.Inthe previous example, Bob's home page might have the title, "Bob's Soccer Store Soccer Shoes and Equipment."ThetitleisthemostimportantpartofSEO,sinceittellsthesearchengineexactlywhat the page is about. Within Bob's home page, it would be helpful to repeat the words "soccer" and "soccershoes"afewtimes,sincesearchenginesalsoscanthetextofthepagestheyindex. Finally,thereareMETAtags.TheseHTMLtagscanreallydistinguishyoursitefromtherestofthe pile. The META tags that most search engines read are the description and keywords tags. Within thedescriptiontags,youshouldtype abriefdescriptionofthe Webpage.Itshouldbesimilarbut moredetailedthanthetitle.Withinthekeywordstags,youshouldlist520wordsthatrelatetothe contentofthepage.UsingMETAtagscansignificantlyboostyoursearchengineranking. Sowhathappenswhenabunchofsitesallhavesimilartitles,content,andMETAtags?Well,most search engines choose to list the most popular sites first. But then how do you get into the most popularsites?ThebestwayistosubmityoursitetoWebdirectories(notjustsearchengines)and getothersitestolinktoyours.Itcanbealongclimbtothetop,butyourperserverancewillpayoff. FormoretipsonSEO,visittheSubmitCornerWebsite.

45. Session
Inthecomputingworld,asessionreferstoalimitedtimeofcommunicationbetweentwosystems. Somesessionsinvolveaclientandaserver,whileothersessionsinvolvetwopersonalcomputers. Acommontypeofclient/serversessionisaWeborHTTPsession.AnHTTPsessionisinitiatedbya Webbrowsereachtimeyouvisitawebsite.Whileeachpagevisitconstitutesanindividualsession, thetermisoftenusedtodescribetheentiretimeyouspendonthewebsite.Forexample,whenyou purchase an item on an ecommerce site, the entire process may be described as a session, even thoughyounavigatedthroughseveraldifferentpages. 46. Tweet Formostofhistory,"tweet"hasbeenthesoundabirdmakes.However,withtheadventofTwitter, theword"tweet"hastakenonawholenewmeaning. Atweetisanonlineposting,or"microblog"createdbyaTwitteruser.Thepurposeofeachtweetis toanswerthequestion,"Whatareyoudoing?"However,tweetscancontainanyinformationyou want to post, such as your plans for the weekend, your thoughts about a TV show, or even notes fromalecture.Youcanpublishatweetusingacomputeroramobilephone.Oncepublished,the tweetwillappearontheTwitterhomepagesofalltheusersthatarefollowingyou.Likewise,your Twitterhomepagewilldisplaythemostrecenttweetsoftheusersthatyouarefollowing.

Eachtweetislimitedto140charactersorless.Thislimitmakesitpossibletoshowseveraltweetson onepagewithoutcertaintweetstakingupalotmorespacethanothers.However,italsomeansthat tweets must be brief, so you must choose your words wisely. Of course, there is no limit to how manytweetsyoucanpost,soifyoureallyhavealottosay,youcanpublishseveraltweetsinarow. Afterall,whatbetterwaytospendyourtimethantolettheworldknowthatyouareatStarbucks, drinkingaFrappuccinoandreadingthelatestissueofTIMEmagazine.Thatisimportantinformation tosharewiththeworld.

47. Twitter
It is an online service that allows you to share updates with other users by answering one simple question:"Whatareyoudoing?" In order to use Twitter, you must first sign up for a free account. Once you have created your account,youcanpostyourownupdatesandviewtheupdatesothershaveposted.Youcansearch forpeopletofolloworyoucanletTwitterselectrandomusers.Onceyouhaveselectedanumberof users,theirmostrecentposts,or"tweets,"willshowuponyourTwitterhomepage.Likewise,your ownlatesttweetswillshowuponthehomepagesofpeoplewhohavedecidedtofollowyou. Twitterlimitseachtweetto140characters,whichmeansthereisnoroomforrambling.

48. Uniform Resource Locator (URL)


AURListheaddressofaspecificWebsiteorfileontheInternet.Itcannothavespacesorcertain othercharactersandusesforwardslashestodenotedifferentdirectories.SomeexamplesofURLs arehttp://www.cnet.com/,http://web.mit.edu/,andftp://info.apple.com/.Asyoucansee,notall URLsbeginwith"http".ThefirstpartofaURLindicateswhatkindofresourceitisaddressing.The secondpartofaURL(afterthe"://")containstheaddressofthecomputerbeinglocatedaswellas the path to the file. For example, in "http://www.cnet.com/Content/Reports/index.html," "www.cnet.com" is the address or domain name of the host computer and "/Content/Reports/index.html" is the path to the file. When an address ends with a slash and not somethinglike".html"or".php,"theWebservertypicallydefaultstoafileinthecurrentdirectory named "index.html," "index.htm," or "index.php." So, if you type in "http://www.apple.com/" and "http://www.apple.com/index.html,"youshouldgetthesamepage.

49. Voice over Internet Protocol (VoIP)


Itisoftenpronounced"voip."VoIPisbasicallyatelephoneconnectionovertheInternet.Thedatais sentdigitally,usingtheInternetProtocol(IP)insteadofanalogtelephonelines.Thisallowspeopleto talk to one another longdistance and around the world without having to pay long distance or internationalphonecharges. In order to use VoIP, you need a computer, an Internet connection, and VoIP software. You also need either a microphone or analog telephone adapter or VoIP telephone. Many VoIP programs allowyoutouseabasicmicrophoneandspeakersetup.OthersrequiresVoIPphones,whicharelike regulartelephonehandsets,buttypicallyconnecttoyourcomputerviaUSB.

50. Virtual Private Network (VPN)


Avirtualprivatenetworkis"tunnelled"throughawideareanetworkWANsuchastheInternet.This means the network does not have to be located in one physical location like a LAN. However, by using encryption and other security measures, a VPN can scramble all the data sent through the wideareanetwork,sothenetworkis"virtually"private. BusinessesoftenuseVPNstocommunicateacrossmultiplelocations.Forexample,alargecompany thathasofficesinseveralcitiesmayneedtosenddatatothedifferentlocationsviatheInternet.To keeptheinformationsecure,thecompanymightsetupaVPNwithanencryptedconnection.Thisis similartohavingasecureintranetovertheInternet.

51. Wide Area Netwrok


ItissimilartoaLocalAreaNetwork(LAN),butit'salotbigger.UnlikeLANs,WANsarenotlimitedto a single location. Many wide area networks span long distances via telephone lines, fiberoptic cables, or satellite links. They can also be composed of smaller LANs that are interconnected. The Internet could be described as the biggest WAN in the world. You could even call the Internet a SuperWANBAMifyouwantedto.

52. Web 2.0


Itistermthatwasintroducedin2004andreferstothesecondgenerationoftheWorldWideWeb. ThenewgenerationoftheWebincludesnewfeaturesandfunctionalitythatwasnotavailableinthe past. However, Web 2.0 does not refer to a specific version of the Web, but rather a series of technologicalimprovements. SomeexamplesoffeaturesconsideredtobepartofWeb2.0arelistedbelow: BlogsalsoknownasWeblogs,theseallowuserstopostthoughtsandupdatesabouttheir lifeontheWeb. Wikis sites like Wikipedia and others enable users from around the world to add and updateonlinecontent. SocialnetworkingsiteslikeFacebookandMySpaceallowuserstobuildandcustomizetheir ownprofilesandcommunicatewithfriends. Web applications a broad range of new applications make it possible for users to run programsdirectlyinaWebbrowser. Web2.0technologiesprovidealeveluserinteractionthatwasnotavailablebefore.Websiteshave become much more dynamic and interconnected, producing "online communities" and making it even easier to share information on the Web. Because most Web 2.0 features are offered as free services,siteslikeWikipediaandFacebookhavegrownatamazinglyfastrates.Asthesitescontinue togrow,morefeaturesareadded,buildingoffthetechnologiesinplace.So,whileWeb2.0maybea staticlabelgiventotheneweraoftheWeb,theactualtechnologycontinuestoevolveandchange.

53. Web server


It is a computer system that hosts websites. It runs Web server software, such as Apache or Microsoft IIS, which provides access to hosted webpages over the Internet. Most Web servers are connectedtotheInternetviaahighspeedconnection,offeringfasterdatatransmissionrates.Afast Internet connection allows Web servers to support multiple connections at one time without slowingdown.AnycomputercanbeusedasaWebserver,aslongasitisconnectedtotheInternet andhastheappropriatesoftwareinstalled.

54. Web pages


They are what make up the World Wide Web. These documents are written in HTML (hypertext markup language) and are translated by your Web browser. Web pages can either be static or dynamic. Static pages show the same content each time they are viewed. Dynamic pages have contentthatcanchangeeachtimetheyareaccessed.Thesepagesaretypicallywritteninscripting languagessuchasPHP,Perl,ASP,orJSP.Thescriptsinthepagesrunfunctionsontheserverthat returnthingslikethedateandtime,anddatabaseinformation.

55. Website
ItisnotthesamethingasaWebpage.Thoughthetwotermsareoftenusedinterchangeably,they shouldnotbe.Sowhat'sthedifference?Toputitsimply,aWebsiteisacollectionofWebpages.For example,Amazon.comisaWebsite,buttherearemillionsofWebpagesthatmakeupthesite.

56. Wiki
It is a Web site that allows users to add and update content on the site using their own Web browser. This is made possible by Wiki software that runs on the Web server. Wikis end up being created mainly by a collaborative effort of the site visitors. A great example of a large wiki is the Wikipedia, a free encyclopaedia in many languages that anyone can edit. The term "wiki" comes fromtheHawaiianphrase,"wikiwiki,"whichmeans"superfast."Iguessifyouhavethousandsof usersaddingcontenttoaWebsiteonaregularbasis,thesitecouldgrow"superfast."

57. World Wide Web


ItisimportanttoknowthatthisisnotasynonymfortheInternet.TheWorldWideWeb,orjust"the Web,"asordinarypeoplecallit,isasubsetoftheInternet.TheWebconsistsofpagesthatcanbe accessed using a Web browser. The Internet is the actual network of networks where all the information resides. Things like Telnet, FTP, Internet gaming, Internet Relay Chat (IRC), and email areallpartoftheInternet,butarenotpartoftheWorldWideWeb.

Das könnte Ihnen auch gefallen