3-D graphics
This field of PC graphics is concerned with generating and display three-dimensional objects in a two-dimensional space, the display screen. Adware
These programs don't cost a penny. The developers support their programs by placing advertisements inside their programs. If you appreciate the work done by these dedicated authors, do them a favor and check out their sponsors. The majority of adware authors have advertisement-free versions of their software available for a small fee. The ads serve as a income source for the author, which allows them to enlarge their program and update more frequently. A few companies are frequently associated with Adware programs: Cydoor, Radiate, Web3000 and Aureate. Alias
This type of nickname is usually short and easy to remember. An alias refers to a type of network resource. They are used so that you won't have to remember long and difficult names. Anonymous FTP
By using the word "anonymous" as your user ID and your e-mail address as the password when you log in to an FTP site, you can bypass local security checks and gain limited access to public files on the remote computer. This type of access is available on most FTP sites. Application
Sometimes known as a client or an app, an application is a program that performs a specific function. Telnet, Microsoft Word, ICQ, BBEdit and QuickTime are common examples of applications. Applet
These small Java programs can be embedded in an HTML page. Applets differ from full-fledged Java applications in that they are not allowed to access certain resources on the local computer. For instance, files, serial devices, modems and printers are prohibited from communicating with most other computers across a network. The current rule is that an applet can only make an Internet connection to the computer from which the applet was sent. Archie
You'll usually hear this term referred to in the phrase "Archie search." Archie is a way of automatically gathering, indexing and retrieving files on the Internet. Most good Archie clients are able to FTP files once you've found the information for which you're looking. Archive
An archive is a collection of files stored on an Internet machine. FTP sites are known as archives. ASCII: American Standard Code for Information Interchange
This is the standard method for encoding characters as 8-bit sequences of binary numbers, allowing a maximum of 256 characters. Text files are customarily called ASCII files. .au
.au is a UNIX sound file format. On the 'Net, you may come across the option to hear a sound clip. If the sound file was originally captured on a UNIX system or converted from another platform, the file that is downloaded to your computer when clicked on might be in the .au format. Your helper applications or browser plug-ins need to be configured to know what to do with this type of file. Authentication
Authentication refers to any process that ensures that users are who they say they are. When you type your name and password, you are authenticated and allowed access. AVI: Audio Video Interleave
This is a Windows platform audio and video file type, a common format for small movies and videos. A 20-second movie clip in .avi format could be as much a 3MB in size. Bandwidth
This refers to the difference, measured in Hz, between the highest and lowest frequencies of a transmission. Most people loosely refer to bandwidth as the amount of data that can be transferred over a network connection. Baud rate
This is a unit used to measure the number of data bits a modem can transfer in one second. One baud is how many signals a modem can handle in one second. Information is measured in bits, and bits come in the signal. Higher baud modems can send and receive more signals in one second, and the faster speeds also cram more bits into a signal. BBS: Bulletin Board System
This is a computer that typically provides e-mail services, file archives and announcements of interest to the bulletin board system's operator, who is known as a sysop. BBSs started out as hobbies for computer enthusiasts, and were mostly accessible by modem. Most BBSs are connected to the Internet. BinHex: BINary HEXadecimal
This is a method of converting non-text, non-ASCII into ASCII. This is necessary because Internet e-mail can only handle ASCII. Bookmark
Bookmark means to mark a document or specific place in a document for later retrieval. Nearly all Web browsers support a bookmarking feature that lets you save the URL of a Web page so that you can easily revisit the page. Bounce
If you send e-mail and it fails to arrive to its intended recipient for any reason, the message "bounces" and returns to you. The subject line in a bounced message usually says something like: "Undeliverable Mail" or "Message Undeliverable." Browser
A browser is a program used to view, download, upload, surf or otherwise access pages on the World Wide Web. Browsers can be text-based, meaning that they do not show graphics or images, but most are text and graphics-based. Browsers access servers and read HTML pages to translate the code into what we see. The final product is referred to as a rendered Web page. Netscape and Microsoft Internet Explorer and are examples of Web browsers. The program you are using right now to view this information is called a browser. Bug
A bug is a programming error that causes a program or computer system to perform erratically, produce incorrect results or crash. The term bug was coined when a real insect was discovered to have fouled up one of the circuits of the first electronic digital computer, the ENIAC. Cache
A cache temporarily stores information from a page in your computer. If you request a page that is stored in a cache, your browser retrieves the page from the cache more quickly than it could from its location on the network. Sometimes you may not want a page to be retrieved from a cache. The page you brought initially may no longer be identical to the page currently offered by the network. If a modification to a particular URL has occurred, you may want the updated page rather than the now stale copy. You can modify your cache preferences in Netscape under Edit > Preferences > Advanced > Cache. Internet Explorer users should go to View > Internet Options > Temporary Internet Files > Settings.
Careware
Careware is software that is freely distributed by way of download. The only payment expected for careware is that the user must demonstrate that they care about something and show that the software is being used to better the user or the user's community. CGI: Common Gateway Interface
This is the standard for running programs on a server from a Web page. Gateway programs, or scripts, are executable programs that can be run by themselves. They have been made external programs in order to allow them to run interchangeably under various information servers. Gateways conforming to this specification can be written in any language that produces executable files. Some of the more popular languages include: C or C++, Perl, Python, TCL and shells. Chat
This is another term for Internet Relay Chat. Client
In Internet terms, it's an application that performs a specific function, such as Telnet or FTP. It's the front-end to an Internet process. In more general terms, a client is a computer system or process that requests a service of another computer system or process. The much talked about client-server architecture refers to a workstation requesting the contents of a file from a server. Commercial Demo
It is a demonstrational copy released by the manufacturer to entice customers to buy their product. A commercial demo will usually only work for a short period of time. It is usually already tested for bugs and is very similar to the full version of the product. A commercial demo might have certain functions that are disabled or inaccessible. Cookie
A cookie is something that you clicked on while using the Internet. The cookie is stored in a text file on your hard drive. This information is usually accessed by a server when you connect to a Web site that requires some information about you or your system. As a user, you log into a system by entering your username and password. A text file is then saved by your browser for later access. This occurrence is called "handing a cookie." It prevents you from having to log in again if you happen to leave the Web site and return later. Cookies are also used in the process of purchasing items on the Web. By saving user information to a text file as someone moves through a shopping Web site, the user can later go to an order form and view all of the items that they have selected. CRC: Cyclic Redundancy Check
This is an error-checking procedure for data transmission. The sending device performs a complex calculation, generating a number based on the data being transmitted. It then sends that number to the receiving device. The receiving device performs the same calculation after transmission. If the results match, the transmission succeeds. If the numbers don't match, it means the message was received in an altered state, and the data may be incorrect. Cyberspace
This is the "world of computers and the society that gathers around them," as referred to by William Gibson in his fantasy novel Neuromancer. It now loosely refers to the online world and even more loosely to the Internet. Dedicated Line
This is a communications line that is used solely for computer connections. If you buy an additional phone line for your modem, that's a dedicated line. There are other types of dedicated lines, such as a T3 or a T1 that is used for a larger network entity. DEK: Data Encryption Key
Much like an actual key used for locking and re-opening doors, DEKs are used for the encryption and decoding of message text, sometimes in the form of a digital signature. Demo
Demoware is limited evaluation software that has some of its features disabled. This software usually allows the use of a fair number of features in order to entice a user to purchase the full product. DES: Data Encryption Standard
This is a standardized encryption method widely used on the Internet. Dial-up
This is a widely-used method of accessing the Internet. A dial-up connection uses regular phone lines to connect one computer to another by way of a modem. DirectX
Microsoft DirectX is a group of technologies designed by Microsoft to make Windows-based computers an ideal platform for running and displaying applications rich in multi-media elements, such as full-color graphics, video, 3-D animation and surround sound. Built directly into the Microsoft Windows family of operating systems, DirectX is an integral part of Windows 98 and Windows 2000, as well as Microsoft Internet Explorer. Domain
This is a "logical" region of the Internet. People sometimes refer to them loosely as sites. Generally, a domain corresponds to an IP address or an area on a host. DNS: Domain Name System
The DNS is a static, hierarchical name service used with TCP/IP hosts. It is housed on a number of servers on the Internet. Basically, it maintains a database for figuring out and finding host names and IP addresses on the Internet. This allows users to specify remote computers by host names rather than numerical IP addresses. The advantage of the DNS is that you don't have to remember numerical IP addresses for all of the Internet sites that you want to access. Download
This means to copy data, usually an entire file, from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service to one's own computer. Dynamic HTML
These are instructions written in HTML that enable Web pages to react to user input and produce content that changes each time it is viewed. With dynamic HTML coding, Web pages are created as the information is delivered to your desktop. There are several technologies for producing dynamic HTML, including CGI scripts, Server-Side Includes, cookies, Java, JavaScript, Cold Fusion and ActiveX. Electronic Mail: e-mail
This is a method by which computer users can exchange messages with each other over a network. E-mail is probably the most widely-used communications tool on the Internet. There are many quirky conventions to e-mail, but most entail a "To:," a "From:" and "Subject:" line. One of e-mail's advantages is its ability to be forwarded and replied to easily. Encryption
This is the basis of network security. Encryption encodes network packets to prevent anyone except the intended recipient from accessing the data. Ethernet
This is the standard and probably the most popular connection type for Local Area Networks (LANs). It was first developed by Xerox and later refined by Digital, Intel and Xerox. In an Ethernet configuration, computers are connected by coaxial or twisted-pair cable, where they contend for network access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) paradigm. Ethernet can transfer information at up to 10 Megabits per second (Mb/s). FAQs: Frequently Asked Questions
FAQs are widely available on the Internet and usually take the form of large, instructional text files. They are written on a wide variety of topics and are usually the most up-to-date source for specialized information. Finger
This is a UNIX command that retrieves information about a user or group of users on the Internet. When executed, the Finger command usually returns the user's real name, whether or not they have unread mail, and the time and date of their last login. Finger also displays two files that are found in the home directory of the user that at whom you directed the command. These two files, the .PLAN and the .PROJECT files, are simply ASCII text files that can be entered by the user to display any information upon the execution of the command. This protocol has become rare due to privacy concerns. Firewall
Firewalls are special computers or computer programs that are set up on a network to prevent intruders from stealing or destroying confidential files. Flame
This is a negative response to an e-mail message or newsgroup posting. If you post an article or send an e-mail to an audience that deems your message inappropriate, expect to get flamed. The most common recipients of flames are users who post commercial messages in public forums, those who post adult material in non-adult areas of the Internet, and users who post or send race or gender-biased comments. The worst sort of flame is known as a mail-bomb. This occurs when the user being flamed opens his or her e-mail and receives a flood of letters with unusually long file attachments that may make the computer crash. Follow-up
This is a reply to an e-mail or newsgroup posting that continues the conversation or idea. It is more commonly known as a "thread." Freenet
This is a network system made up of community-based bulletin board system with e-mail, information services, interactive communications and conferencing. Like public television, they are usually funded and operated by individuals or organizations. Freenet providers are part of the National Public Telecomputing Network, a Cleveland-based organization that works to make computer networking services as freely available as public libraries. Freeware
Freeware is... free, just as you'd imagine it! The software was developed just for the sake of providing you, the end user, with a cool new application. If you really like the program, you might take a moment to send the author a thank you note, but there are no strings attached to these programs. FTP: File Transfer Protocol
This is the most widely-used way of downloading and uploading files across an Internet connection. The File Transfer Protocol is a standardized way to connect computers so that files can be shared between them easily. There is a set of commands in FTP for making and changing directories, transferring, copying, moving and deleting files. Formerly, all FTP connections were text-based, but graphical applications are now available that make FTP commands as easy as dragging and dropping. FTP clients exist for a number of platforms. Gateway
This is a kind of go-between device or program that passes information between networks that normally couldn't communicate. What used to be called a gateway is now called a router. GIF: Graphics Interchange Format
This format was developed by Compuserve using compression technology from Unisys. On the World Wide Web, pictures and graphics that you see on Web pages are usually in GIF format because the files are small and download quickly. Gopher
This is an information search and retrieval tool used mostly for research. Gopher information is stored hierarchically on computers across the Internet. It uses a simple protocol that allows a client to access information from a multitude of Gopher servers at one time, creating what's known as "gopher space." The most common search tools in gopher are Veronica and Jughead. Gopher clients exist for most platforms. GPL: GNU Public License
GPL stands for GNU Public License. Software released under this license is intended to be "free" software. It is free in a free speech sense. The programs themselves are not free. Essentially, you get the source code and binaries. Hacker
This is a computer user who works to understand the ins and outs of computers, networks and the Internet. Hackers are generally benign and believe that information should be free. Host
This is a computer that is attached to a network or the Internet. Hosts allow users on client machines to connect and share files or transfer information. Individual users communicate with hosts by using client application programs. Hypertext
This is a type of text that allows embedded "links" to other documents. Clicking on or selecting a hypertext link displays another document or section of a document. Most World Wide Web documents contain hypertext. HTML: Hypertext Markup Language
This is the standard way of marking text documents for publication on the World Wide Web. HTML is marked up using "tags" surrounded by brackets. HTTP: Hypertext Transfer Protocol
This is the protocol that tells the server what to send to the client so that the client can view Web pages, FTP sites or other areas of the 'Net. Image Map
This is a single graphic image containing more than one hot spot. Image maps are used extensively on the World Wide Web. Each hot spot in a Web image takes you to a different Web page or to another area of the same Web page. Instant Messaging
This is a type of communications service that enables you to create a private chat room with another individual. Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that particular individual. Interface
This is something that connects two separate entities. For example, a user interface is a part of a program that connects the computer with a human operator. Internet
The Internet is a globally linked system of computers that are logically connected based on the Internet Protocol (IP). The Internet provides different ways to access private and public information worldwide. IP: Internet Protocol
This is an industry standard, connectionless, best-effort packet switching protocol used as the network layer in the TCP/IP Protocol Suite. InterNIC
The Internet Network Information Center maintains the database for all DNS entries on the Internet. Intranet
This is a private network, inside a company or an organization, that uses the same kinds of software that you would find on the public Internet. The difference is that an intranet is only for internal use. As the Internet has become more popular, many of the tools used on the Internet are being used in private networks. For example, many companies have Web servers that are available only to employees. IP Address
This is the 32-bit address defined by the Internet Protocol. Every resource on the Internet has a unique numerical IP address, represented in dotted decimal notation. For example, 10.10.10.59 is an IP address. IP addresses are the closest thing the Internet has to phone numbers. When you "call" that number, using any number of connection methods, you get connected to the computer that "owns" that IP address. IRC: Internet Relay Chat
IRC is like a world-wide party line. IRC allows multiple users to converse in real-time on different "channels." Channels, which have a "#" sign preceding their name, vary in traffic and content. Channel operators moderate the conversation and have the ability to "kick" people from channels, or even ban them if their actions warrant it. IRC clients are available for nearly every platform. ISDN: Integrated Services Digital Network
ISDN technology combines voice and digital network services in a single medium. ISDN makes it possible for communications carriers to offer their customers digital data services as well as voice connections through a single line. CCITT defines the standards relating to ISDN. ISO: International Organization for Standardization
Founded in 1946, this is an organization of 89 member countries responsible for setting world standards in many electronics areas. Members of the ISO are the national standards organizations of the member countries. ISP: Internet Service Provider
An ISP is a company that maintains a network that is linked to the Internet by way of a dedicated communication line, usually a high-speed link like a T3. An ISP offers the use of its dedicated communication lines to companies or individuals who can't afford the high monthly cost for a direct connection. Using a modem, you can dial up to a service provider whose computers will connect you to the Internet, typically for a fee. JAR File: Java ARchive file
A JAR file is a compressed collection of files that contains the class, image and sound files for a Java applet. Any applet may include several files, each of which has to be downloaded along with the Web page in which it appears. By putting them into a single file and compressing that file, download time is saved. Java
Developed by Sun Microsystems, Java is a programming language that is specifically designed for writing programs that can be safely downloaded to your computer through the Internet and immediately run without the fear of viruses or other harm to your computer or files. Using small Java programs called Applets, Web pages can include functions like animations and calculators. Java is an object-oriented, multi-threaded programming environment. It is best for creating applets and applications for the Internet, intranets and any other complex, distributed network. JavaBeans
JavaBeans is an object-oriented programming interface from Sun Microsystems. It lets you build reusable applications or components that can be deployed in a network on any major operating system platform. Like Java applets, JavaBeans components, or "Beans" as they are more commonly called, can be used to give World Wide Web pages interactive capabilities, like computing interest rates or varying page content based on user or browser characteristics. JDK: Java Development Kit
This is a software development package from Sun Microsystems that implements the basic set of tools that is needed to write, test and debug Java applications and applets. JPEG: Joint Photographic Experts Group
This is one of the two most common types of images used on the World Wide Web, the other being GIF. JPEG is named after the Joint Photographic Experts Group, the original name of the committee that wrote the standard. LAN: Local Area Network
LANs are now commonplace in most businesses, allowing users to send e-mail and share resources like files, printers and modems. Currently, most larger companies connect their LANs to the Internet, allowing users to connect to resources within or outside the LAN. Leased Line
This is a dedicated, full-time connection used to link a user or network to an Internet Service Provider or another network. Library
1. A library can be a collection of files.2. In programming, a library is a collection of precompiled routines that programs can use.
Link
A link is a text or an image area on a Web page that a user can click on to connect to or reference another document. Links can connect several kinds of documents. Most commonly, links are thought of as what connects two Web pages or Web sites. Links can also reference a different part of the same document, linking to a file which will download to your computer. What actually occurs when you click on a link is determined by the file's MIME type, which is configured on your system. For example, your browser is configured to display Web page files whenever you click on a file whose MIME extension is HTML. Links are also called hyperlinks, hypertext and hot links. Macro
This is a symbol, name or key that represents a list of commands, actions or keystrokes. Many programs allow you to create macros so that you can enter a single character or word that performs a whole series of actions. Mail Reflector
This is a program that distributes files or information in response to requests that were sent by way of e-mail. Many Listservs have mail reflectors. You can request documents from a reflector by sending messages with the subject line: SEND document name. Mail reflectors are also being used to provide FTP-like services to users with limited Internet access. Mailing List
This is a list of e-mail addresses that is used to forward messages to groups of people. When you subscribe to a mailing list, you receive all mail sent to that list. MIDI
This is a connectivity standard that enables you to hook together computers, musical instruments and synthesizers in order to make and orchestrate digital sound. The term MIDI is used to describe the standard itself, the hardware that supports the standard and files that store information that the hardware can use. MIDI sound files usually have an extension of .mid. If you come across any of these files on the Internet, you will need a helper application configured in order to play them. Mirror Site
Due to the popularity of some FTP and Web sites, mirror sites came into existence. They are areas on computers that contain exact replicas of the directory structures of other computers. If you have trouble getting connected to an FTP site because of high traffic, you can often connect to a mirror site that contains the same information. Mirror sites are updated at regular intervals. MOD: Module Format
A MOD-File is a collection of sample data and a description of how to play the samples. MPEG: Motion Picture Experts Group
MPEG is a type of audio or video file that is commonly found on the Internet. In order to hear or see an MPEG movie, you will need to install a helper application or a Web browser plug-in. MPEG is an algorithm for compressing audio and video; it is not to be confused with Motion-JPEG. Modem
Modem means modulate/de-modulate because that's exactly what it does with a signal. A modem is a piece of hardware, either internal or external, that allows your computer to connect to other computers. You can also send faxes and make data connections and voice connections if your type of modem supports it. You will need software, Dial-up Networking, for example, to make your modem work. Moderator
This is the person who manages moderated mailing lists, newsgroups or online discussion forums for services like AOL, CompuServe and MSN. Mosaic
Mosaic is one of the original graphical browsers for the World Wide Web that supports hypermedia. The National Super Computer Association invented the Mosaic browser, which quickly became the industry standard. MP3: MPEG-1, Layer 3
MPEG-1, Layer 3 is an amazing standard for audio compression. It is capable of 10:1 compression with little loss in quality. An audio sample at CD Quality (44KHz, 16 bit, Stereo) takes up 172KB for every second with a standard WAV Audio file. MP3 compression takes only 16KB per second when compressed at the standard bitrate of 128Kbps. By compressing at lower bitrates, MP3s can be lowered to 12KB per second with some quality loss. MUD: Multi-User Domain
MUDs are role-playing games that take place on a computer. Users can Telnet to a MUD host and create a character. MUDs can be action, adventure or fantasy-based games. They allow you to save your character for future play. Some MUDs have thousands of registered characters, and most foster a community or culture of their own. These are highly-addictive areas of the Internet, and users can spend many hours enthralled in this type of activity. Multimedia
This is the use of computers to present text, graphics, video, animation and sound in an integrated way. MIME: Multipurpose Internet Mail Extensions Encoding
MIME is a standardized method for organizing divergent file formats. The method organizes file formats according to the file's MIME type. When Internet software retrieves a file from a server, the server provides the MIME type of the file, and the file is decoded correctly when transferred to your machine. Netiquette
A combination of the words "'Net" and "etiquette," this refers to proper behavior on a network, and more generally, the Internet. The key element in Netiquette is remembering that actual people are on the other end of a computer connection, and offensive comments or actions are just as offensive, even if you can't see the recipient. Other rules of Netiquette include not wasting bandwidth or other users' time. For instance, sending unsolicited e-mail attachments constitutes bad Netiquette. Network
A network is two or more computers that are connected. The most common types of networks are: - LAN, local area network: The computers are in close proximity to one another. They are usually in the same office space, room or building.
- WAN, wide area network: The computers are in different geographic locations and are connected by telephone lines or radio waves.