Create an account
A collection of technologies that allows the creation of Web applications that can update information on a page without requiring the user to do a page refresh or leave the page.
A small program designed to be run from within another application. Java applets are often run on your computer by your browser through the Java Virtual Machine (an application built into current browsers).
cascading style sheets (CSS)
A list of statements (also known as rules) that define in one single location how HTML/XHTML elements are to be displayed.
A computer program that conforms to the Common Gateway Interface (CGI) specification, which provides a method for sending data between end users (browser users) and Web servers.
A method of communication in which a dedicated connection is formed between two points (such as two people on telephones) and the connection remains active for the duration of the transmission.
classless interdomain routing (CIDR)
Pronounced "cider," this is an addressing scheme that allows a single IP address to represent several unique IP addresses by adding a network prefix (a slash and a number) to the end of the last octet; also known as supernetting.
A way of describing typical network functions. Client computers (such as your desktop PC) request services, and servers provide ("serve up") those services to the clients.
A computer program that runs on the client computer and requires no interaction with a Web server.
The process of using the Internet to deliver business, entertainment, or other services that were previously delivered by conventional means.
A computer that hosts software that enables consumers to purchase goods and services over the Web. These servers generally use special security protocols to protect sensitive information (such as credit card numbers) from being intercepted.
Common Gateway Interface (CGI)
Provides a methodology by which a browser can request that a program file be executed (or run) instead of just being delivered to the browser.
A set of rules for accomplishing electronic information exchange. If the Internet is the information superhighway, then protocols are the driving rules.
A protocol that a host computer can use to send data over the network without establishing a direct connection with any specific recipient computer.
A protocol that requires two computers to exchange control packets, which set up the parameters of the data exchange session, before sending packets that contain data.
The process of taking a task that an employee or a contractor usually performs (such as product design) and instead outsourcing that task to a large group of people, usually via the Internet.
Document Object Model (DOM)
A means to organize objects and page elements in a Web page. DOM defines every item on a Web page, such as graphics, tables, and headers, as an object.
A part of a Uniform Resource Locator (URL). Domain names consist of two parts: the site's host and a suffix that indicates the type of organization. (Example: popsci.com)
Domain Name System (DNS) server
A server that contains location information for domains on the Internet and functions like a phone book for the Internet.
The process of assigning Internet Protocol (IP) addresses when users log on using their Internet service provider (ISP). The computer is assigned an address from an available pool of IP addresses.
Dynamic Host Configuration Protocol (DHCP)
The protocol that handles dynamic addressing. Part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, DHCP takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.
Dynamic HyperText Markup Language (DHTML or dynamic HTML)
A combination of Web development technologies including HTML, cascading style sheets, and a scripting language that are used to add interactivity to a Web site after the Web site has been loaded onto the client computer.
The process of encoding data (ciphering) so that only the person with a corresponding decryption key (the intended recipient) can decode (or decipher) and read the message.
A computer deployed to provide remote storage space or to act as a repository for files that users can access.
File Transfer Protocol (FTP)
A protocol used to upload and download files from one computer to another over the Internet.
The process of two computers exchanging control packets that set up the parameters of a data exchange.
A number system that uses 16 digits to represent numbers; also called a base 16 number system.
The bracketed information that surrounds elements of a Web page in order to convey information about them and define how their content is to be displayed.
HTML/XHTML embedded scripting language
A client-side method of embedding programming language code directly within the HTML/XHTML code of a Web page.
HyperText Transfer Protocol (HTTP)
The protocol that allows files to be transferred from a Web server so that you can see them on your computer by using a browser.
HyperText Transfer Protocol Secure (HTTPS)
A combination of the HTTP protocol and a network security protocol (usually SSL or TLS) that ensure data is sent securely over the Web.
The main pathway of high-speed communications lines over which all Internet traffic flows.
A section of your hard drive that stores information that you may need again for surfing (such as IP addresses and frequently accessed Web pages).
Internet Corporation for Assigned Names and Numbers (ICANN)
The organization responsible for allocating IP addresses to network administrators to ensure they are unique and have not been assigned to other users.
Internet exchange point (IXP)
A device that allows different Internet service providers to exchange information between networks.
Internet Protocol version 6 (IPv6)
A proposed IP addressing scheme that makes IP addresses longer, thereby providing more available IP addresses. It uses eight groups of 16-bit numbers.
Internet Protocol address (IP address)
The means by which all computers connected to the Internet identify each other. It consists of a unique set of four numbers separated by dots such as 184.108.40.206.
multipurpose Internet mail extensions (MIME)
A specification that was introduced in 1991 to simplify attachments to e-mail messages. All e-mail client software now uses this protocol for attaching files.
negative acknowledgment (NAK)
What computer Y sends to computer X if a packet is unreadable, indicating the packet was not received in understandable form.
The part of a network address under the CIDR IP addressing scheme. It consists of a slash and a number added to the end of the last octet in an IP address.
Eight bits. For example, each of the four numbers in the dotted decimal notation of an Internet Protocol (IP) address is represented by an octet.
packet (data packet)
A small segment of data that is bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it is being sent.
A communications methodology in which data is broken into small chunks (called packets) and sent over various routes at the same time. When the packets reach their destination, they are reassembled by the receiving computer.
point of presence (POP)
A bank of modems through which many users can connect to an Internet service provider (ISP) simultaneously.
positive acknowledgment (ACK)
What computer Y sends when it receives a data packet that it can read from computer X.
One-half of a pair of binary files that is needed to decrypt an encrypted message. The private key is kept only by the individual who created the key pair and is never distributed to anyone else. The private key is used to decrypt messages created with the corresponding public key.
A procedure in which only the two parties involved in sending a message have the code. This could be a simple shift code where letters of the alphabet are shifted to a new position.
A software product whose code is not generally available (is kept private) and that is generally developed and marketed by a single company.
One-half of a pair of binary files that is needed to decrypt an encrypted message. After creating the keys, the user distributes the public key to anyone he wishes to send him encrypted messages. A message encrypted with a public key can be unencrypted only using the corresponding private key.
A procedure in which the key for coding is generally distributed as a public key that may be placed on a Web site. Anyone wishing to send a message codes it using the public key. The recipient decodes the message with a private key.
root DNS server
A group of servers maintained throughout the Internet to which ISP Web servers connect to locate the master listings for an entire top-level domain.
A domain that falls within top-level domains of the Internet. Each second-level domain needs to be unique within that particular domain but not necessarily unique to all top-level domains.
Secure Sockets Layer (SSL)
A protocol that provides for the encryption of data transmitted using the Internet. The current versions of all major Web browsers support SSL.
simple mail transfer protocol (SMTP)
A protocol for sending e-mail along the Internet to its destination.
A means of assigning an Internet Protocol (IP) address that never changes and is most likely assigned manually by a network administrator.
A device for transmitting data on a network. A switch makes decisions, based on the media access control (MAC) address of the data, as to where the data is to be sent.
A high-speed fiber-optic communications line that is designed to provide much higher throughput than conventional voice (telephone) and data (DSL or cable) lines.
A network protocol used primarily on the Internet for connecting to a remote computer to make it accessible to other computers.
A process used by the Transmission Control Protocol (TCP) to establish a connection.
Transmission Control Protocol (TCP)
A protocol that prepares data for transmission and provides for error checking and resending lost data.
Transport Layer Security (TLS)
A protocol that provides data integrity and security for transmissions over the Internet.
User Datagram Protocol (UDP)
A protocol that prepares data for transmission but that has no resending capabilities.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together