With ABCD Computer - Part III we are coming to an end of the series of blog posts covering popular terms from different zones. This particular blog post will focus on some of common terms from internet that we encounter everyday.
Following 13 terms include some of the hot-cakes from internet arena. So lets get started...
1. 404 Error
A 404 error is a common website error message that indicates a webpage cannot be found. It may be produced when a user clicks an outdated (or "broken") link or when a URL is typed incorrectly in a Web browser's address field.
2. Active X
Following 13 terms include some of the hot-cakes from internet arena. So lets get started...
1. 404 Error
A 404 error is a common website error message that indicates a webpage cannot be found. It may be produced when a user clicks an outdated (or "broken") link or when a URL is typed incorrectly in a Web browser's address field.
2. Active X
This Microsoft-based technology was built to link desktop applications to the World Wide Web. Using ActiveX development tools, software developers can create interactive Web content for their applications.
For example, Word and Excel documents can be viewed directly in Web browsers that supports ActiveX. While ActiveX is a useful technology, the downside is that you need to have a up-to-date version ActiveX installed on your machine in order to use ActiveX-enabled content.
3. BitTorrent
BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth required to transfer files. It does this by distributing file transfers across multiple systems, thereby lessening the average bandwidth used by each computer.
For example, if a user begins downloading a movie file, the BitTorrent system will locate multiple computers with the same file and begin downloading the file from several computers at once.
4. Bookmark
Similar to a real-life bookmark, an Internet bookmark acts as a marker for a Web site. (In Internet Explorer, they're called "Favorites").
When using a Web browser, you can simply select a bookmark from the browser's Bookmarks menu to go to a certain site. This way, you don't have to go through the redundant process of typing in the Internet address each time you visit one of your favorite sites.
5. Captcha
A captcha is program used to verify that a human, rather than a computer, is entering data. Captchas are commonly seen at the end of online forms and ask the user to enter text from a distorted image (shown below).
The text in the image may be wavy, have lines through it, or may be highly irregular, making it nearly impossible for an automated program to recognize it. Most captchas allow the user to regenerate the image if the text is too difficult to read. Some even include an auditory pronunciation feature.
6. Cloud Computing
Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet.
The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users.
7. FTP (File Transfer Protocol)
Stands for "File Transfer Protocol." It is a common method of transferring files via the Internet from one computer to another. However, you can also use a Web browser like Netscape or Internet Explorer to access FTP servers. To do this, you need to type the URL of the server into the location field of the browser.
For example: "ftp://ftp.servername.com/" will give you a listing of all the directories of the FTP server, "ftp://ftp.servername.com/directory/" will give you a listing of all the files available in that directory, and "ftp://ftp.servername.com/directory/filename" will download the actual file to your computer. Many FTP servers are "anonymous FTP" servers which means you can log in with the user name "anonymous" and your e-mail address as the password. Other FTP servers require a specific login in order to access the files.
8. IP Address
Also known as an "IP number" or simply an "IP," this is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. Every computer, whether it be a Web server or the computer you're using right now, requires an IP address to connect to the Internet. IP addresses consist of four sets of numbers from 0 to 255, separated by three dots.
For example "66.72.98.236" or "216.239.115.148". Your Internet Service Provider (ISP), will assign you either a static IP address (which is always the same) or a dynamic IP address, (which changes everytime you log on).
9. POP3 (Post Office Protocol)
Stands for "Post Office Protocol." POP3, sometimes referred to as just "POP," is a simple, standardized method of delivering e-mail messages. A POP3 mail server receives e-mails and filters them into the appropriate user folders. When a user connects to the mail server to retrieve his mail, the messages are downloaded from mail server to the user's hard disk.
When you configure your e-mail client, such as Outlook (Windows) or Mail (Mac OS X), you will need to enter the type of mail server your e-mail account uses. This will typically be either a POP3 or IMAP server. IMAP mail servers are a bit more complex than POP3 servers and allow e-mail messages to be read and stored on the server. Many "webmail" interfaces use IMAP mail servers so that users can manage all their mail online.
10. Proxy Server
Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet.
By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.
11. SEO (Search Engine Optimization)
For example, Word and Excel documents can be viewed directly in Web browsers that supports ActiveX. While ActiveX is a useful technology, the downside is that you need to have a up-to-date version ActiveX installed on your machine in order to use ActiveX-enabled content.
3. BitTorrent
BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth required to transfer files. It does this by distributing file transfers across multiple systems, thereby lessening the average bandwidth used by each computer.
For example, if a user begins downloading a movie file, the BitTorrent system will locate multiple computers with the same file and begin downloading the file from several computers at once.
4. Bookmark
Similar to a real-life bookmark, an Internet bookmark acts as a marker for a Web site. (In Internet Explorer, they're called "Favorites").
When using a Web browser, you can simply select a bookmark from the browser's Bookmarks menu to go to a certain site. This way, you don't have to go through the redundant process of typing in the Internet address each time you visit one of your favorite sites.
5. Captcha
A captcha is program used to verify that a human, rather than a computer, is entering data. Captchas are commonly seen at the end of online forms and ask the user to enter text from a distorted image (shown below).
The text in the image may be wavy, have lines through it, or may be highly irregular, making it nearly impossible for an automated program to recognize it. Most captchas allow the user to regenerate the image if the text is too difficult to read. Some even include an auditory pronunciation feature.
6. Cloud Computing
Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet.
The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users.
7. FTP (File Transfer Protocol)
Stands for "File Transfer Protocol." It is a common method of transferring files via the Internet from one computer to another. However, you can also use a Web browser like Netscape or Internet Explorer to access FTP servers. To do this, you need to type the URL of the server into the location field of the browser.
For example: "ftp://ftp.servername.com/" will give you a listing of all the directories of the FTP server, "ftp://ftp.servername.com/directory/" will give you a listing of all the files available in that directory, and "ftp://ftp.servername.com/directory/filename" will download the actual file to your computer. Many FTP servers are "anonymous FTP" servers which means you can log in with the user name "anonymous" and your e-mail address as the password. Other FTP servers require a specific login in order to access the files.
8. IP Address
Also known as an "IP number" or simply an "IP," this is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. Every computer, whether it be a Web server or the computer you're using right now, requires an IP address to connect to the Internet. IP addresses consist of four sets of numbers from 0 to 255, separated by three dots.
For example "66.72.98.236" or "216.239.115.148". Your Internet Service Provider (ISP), will assign you either a static IP address (which is always the same) or a dynamic IP address, (which changes everytime you log on).
9. POP3 (Post Office Protocol)
Stands for "Post Office Protocol." POP3, sometimes referred to as just "POP," is a simple, standardized method of delivering e-mail messages. A POP3 mail server receives e-mails and filters them into the appropriate user folders. When a user connects to the mail server to retrieve his mail, the messages are downloaded from mail server to the user's hard disk.
When you configure your e-mail client, such as Outlook (Windows) or Mail (Mac OS X), you will need to enter the type of mail server your e-mail account uses. This will typically be either a POP3 or IMAP server. IMAP mail servers are a bit more complex than POP3 servers and allow e-mail messages to be read and stored on the server. Many "webmail" interfaces use IMAP mail servers so that users can manage all their mail online.
10. Proxy Server
Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet.
By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.
11. SEO (Search Engine Optimization)
Stands for "Search Engine Optimization." Just about everyone wants his or her site to appear in the top listings of all the major search engines.
For example, ABC runs an online soccer store. He wants his site to show up in the top few listings when someone searches for "soccer shoes." Then he gets more leads from search engines, which means more traffic, more sales, and more revenue. The problem is that there are thousands of other soccer sites, whose owners are hoping for the same thing. That's where search engine optimization, or SEO, comes in.
12. URL (Uniform Resource Locator)
Stands for "Uniform Resource Locator." A URL is the address of a specific Web site or file on the Internet. It cannot have spaces or certain other characters and uses forward slashes to denote different directories.
Some examples of URLs are http://www.thinkdigit.com/, http://dauniv.ac.in/, and ftp://info.apple.com/. As you can see, not all URLs begin with "http". The first part of a URL indicates what kind of resource it is addressing.
13. Web 2.0
For example, ABC runs an online soccer store. He wants his site to show up in the top few listings when someone searches for "soccer shoes." Then he gets more leads from search engines, which means more traffic, more sales, and more revenue. The problem is that there are thousands of other soccer sites, whose owners are hoping for the same thing. That's where search engine optimization, or SEO, comes in.
12. URL (Uniform Resource Locator)
Stands for "Uniform Resource Locator." A URL is the address of a specific Web site or file on the Internet. It cannot have spaces or certain other characters and uses forward slashes to denote different directories.
Some examples of URLs are http://www.thinkdigit.com/, http://dauniv.ac.in/, and ftp://info.apple.com/. As you can see, not all URLs begin with "http". The first part of a URL indicates what kind of resource it is addressing.
13. Web 2.0
Web 2.0 is term that was introduced in 2004 and refers to the second generation of the World Wide Web. The term "2.0" comes from the software industry, where new versions of software programs are labeled with an incremental version number. Like software, the new generation of the Web includes new features and functionality that was not available in the past. However, Web 2.0 does not refer to a specific version of the Web, but rather a series of technological improvements.
Some examples of features considered to be part of Web 2.0 are: blogs, wikis, social networking, web applications, etc.
I hope ABCD of Computer blog post series helps you in understanding various concepts related to computer. Give your suggestions for upcoming blog posts.
~
Some examples of features considered to be part of Web 2.0 are: blogs, wikis, social networking, web applications, etc.
I hope ABCD of Computer blog post series helps you in understanding various concepts related to computer. Give your suggestions for upcoming blog posts.
~
2 comments:
Dear Ankur,
Nice collections of various terms. Quite informative. I enjoyed reading your all blogs. Good job done.
looking forward to read your next blog.
Regards
Shravan Gupta
Dear Shravan,
Thanks a lot for your for consistent feedback. I found this platform amazingly effective to share peer-to-peer knowledge, updates, etc.
Keep reading... next blog post on "Installing Windows via USB/Memory Card/Pen drive". Suggest any specific topic you want to be taken here.
Regards,
Ankur Shukla
http://asncreation.blogspot.com
Post a Comment