Lab Lingo for Website

Total Page:16

File Type:pdf, Size:1020Kb

Lab Lingo for Website Glossary Application A program designed to perform a specific function directly for the user or, in some cases, for another application. AppleTalk A Macintosh-specific network protocol for sharing resources (files, printers, etc). Appletalk can use special hardware or run on Ethernet. Bandwidth Bandwidth is a measurement for the rate at which data can be transferred, or in non-digital systems, the range of frequencies available for transmission. Bit (Binary Digit) The smallest unit of information in a computer. Browser Program used for accessing web, gopher and other internet sites. The most well-known browsers are Lynx, Mosaic, and Netscape. Byte (Binary Term) A unit of storage capable of holding 8 bits. Cache A cache is a system for storing frequently accessed information for faster response. Cache memory on your motherboard is extra-fast RAM that keeps a copy of the most recently requested bits from regular RAM. A 'caching proxy web server' keeps the most recently requested web documents stored locally, reducing response time from (often very slow) remote web sites. Cookie A piece of data given to your browser by a web server, so that your browser will hand it back to the server with subsequent requests. First implemented by Netscape. Although there has been some furor over the privacy implications of cookies, they cannot be used to reveal anything about you to the server that you have not already explicitly revealed. Compress To make a file smaller by applying a compression algorithm, usually for the purpose of conserving space or speeding up file transfers. This can also refer to the Unix command to compress a file which appends '.Z' to the filename, '.gz' or to the free GNU enhanced version, zip. Desktop The main Graphical User Interface (GUI) generated by the operating system. Directory The Unix equivalent of Macintosh or MS-Windows 'folder', all files are stored in directories. A directory can be created with the mkdir command and empty directories are removed with rmdir. Domain An internet 'domain' is a subsection of the internet. The primary domains of the internet are .COM, .INT, .NET, .MIL, and .ORG, which refer to Commercial, International, Network, Military, and Simmons College • GSLIS 84 Organization. These domains are administered by the Internic. There are also two-letter domains associated with specific countries. Each domain has a primary and secondary Domain Name Server associated with it. DOS Disk Operating System, the basic computer instruction set used to provide an interface to storage and other devices. Also, Denial Of Service, a form of attack in which the goal is to make a computing resource unavailable to legitimate users. See also OS. DSL Digital Subscriber Line. A method of providing connectivity at speeds up to 9Mbps using the existing POTS copper wiring. Ethernet A standard for LAN communications, Ethernet defines the hardware and communications standard for communications at 10Mbps over coax, twisted-pair or fiber. There is also a 'fast Ethernet' standard for both twisted pair and fiber. Ethernet is defined in IEEE 802.3. Finger A Unix command that provides information about users logged in, and can also be used to retrieve the .plan and .project files from a users home directory. Firewall A firewall is used on some networks to provide added security by blocking access to certain services in the private network from the rest of the internet, in the same way that a firewall in a building keeps fire from spreading, an internet firewall keeps hackers from spreading. Floppy Disk A portable ma gnetic storage medium for computer data. Floppy disks typically hold 1.44 MB of information Font A character set or typeface family denoting a particular size and style, either for on-screen display or printing, usually on a laser or inkjet printer. FTP An Acronym for File Transfer Protocol, a method of retrieving files to your home directory or directly to your computer using SLIP/PPP. There are thousands of FTP sites on the Internet offering files and programs of all kinds. GIF is an acronym for Graphic Interchange Format, developed by CompuServe this is a very popular format for exchanging pictures, it is slowly being replaced by the JPG image format. Gigabyte A measure of electronic holding space. One gigabyte equals 1,073,741,824 bytes. Host Any ma chine can be a host. The machine you log into is your 'login host', the machine you read news from is a 'news host', etc. HTML Acronym for HyperText Markup Language, the underlying formatting for World-Wide-Web documents. A Primer explaining the format is available for beginners. Simmons College • GSLIS 85 HTTP Acronym for HyperText Transport Protocol the system for requesting HTML documents from the World-Wide-Web. Home A directory or WWW page that is 'owned' by a user is often referred to as their 'home directory' or 'home page'. Hard Drive The primary storage location on the computer. Hardware The physical components of the computer system. Icon A graphical image representing a (usually easily recognized) function or control, usually reacts to being selected by performing some useful or entertaining action. A primary feature of most GUIs. Internet A loose confederation of networks around the world, the networks that make up the Internet are connected through several backbone networks. The Internet grew out of the U.S. Government ARPAnet project, and is specifically designed to have no central governing authority or 'root', node. IP Internet Protocol, the standard communications scheme used for internet connected hosts, as specified in RFC 791. ISP Acronym for Internet Servic e Provider, these are the companies that provide access to end users of the Internet, as opposed to NSPs. There are several lists of regional ISPs, including NetUSA. Java Java is platform-independent object-oriented programming language. Originally developed as 'oak' by Sun Microsystems's Green Project in 1991, Java is superficially very similar to C++, but is unique in many ways. Java interpreters have been ported to every viable computing platform in existence. JPG An variable-compression image format, JPEG supports true color images and glossy compression. The name comes from Joint Pictures Expert Group. Kilobyte A Kilobyte consists of 1,024 bytes. Keyboard An input device used to submit data to the computer. LAN Acronym for Local Area Network, a LAN is a network contained within a single physical site (one or more buildings), as opposed to a WAN. MIDI Musical Instrument Digital Interface. Extensive documentation is provided by the MMA. Simmons College • GSLIS 86 Modem Shorthand for MODulator/DEModulator, a modem allows the transmission of digital information over an analog phone line. A modem dictionary is available that defines all the basic terms. MS/DOS Microsoft DOS, an older non-graphical operating system, predecessor to Microsoft Windows. Megabyte A measure of electronic holding space. One megabyte equals 1,048,576 bytes. Memory The electronic holding place for instructions and data that your computer's microprocessor can reach quickly Menu A list of options from which you can execute commands. Monitor A video or computer display device. Mouse A small hand-controlled input device that relays signals to the computer, which moves a corresponding pointer on the monitor screen. Netscape(tm) A commercial GUI World-Wide-Web browser for X-Windows, MS-Windows and Macintosh, available from Netscape Communications. Newsgroup A message area in the Usenet News, each newsgroup can be either 'moderated' with only postings approved by a moderator publicly posted, or 'unmoderated' where all messages are distributed to the newsgroup immediately. OS Operating System, the basic instruction set used to provide a computer with the routines necessary to communicate with the user and hardware devices. Operating System An application that manages other applications and devices. Output Device Any device that displays information from the computer Parallel Parallel data communications send several bits over the connection (usually multiple physical wires) at once, as opposed to serial links which send one bit at a time. Parallel connections are generally used for printers and for some high speed data connections. Pixel The smallest individually controllable element of a video or printed image. A digital image is composed of an array of individual pixels, each of which is assigned a value determining the color or brightness. Simmons College • GSLIS 87 Proxy A proxy is somebody you delegate to do something for you, in the Internet, a 'proxy web server' is often used for hosts behind firewalls. The firewalled host sends a http request to the proxy server, which forwards it to the real web server outside, collects the response, and passes it back to the internal host. Program The Windows OS term for an application. RAM Acronym for Random Access Memory, a form of primary storage that allows direct read and write operations. RAM storage is generally a very high-speed medium that requires constant power to avoid data loss. ROM Acronym for Read-Only Memory, ROM is used for permanent storage, such as system bootstrap routines. Reboot To restart a computer. Server A server provides information or other services to it's clients. Most network protocols are client- server based. While a server usually refers to an entire machine, it's can also be used to refer to a particular daemon on that machine. SGML Acronym for Standard Generalized Markup Language, a generic grammar used as the basis for many document formats. Additional information on SGML is available from w3.org. Shortcut An icon that points to a particular file, directory or application in Windows OS. Speaker A device that translates computer signals into sound. Telnet A communications protocol for connecting to other computers locally or across the Internet.
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • T1, U-2 and L1 Transmitters™ Software V3.06 April 22, 2014
    ™ Air Integrated Dive Computer User Manual ™ Air Integrated Dive Computer Software v1.18 Ultrasonic software v1.11 And T1, U-2 and L1 Transmitters™ Software v3.06 April 22, 2014 Liquivision Products, Inc -1- Manual 1.6; Lynx 1.18; US 1.11; U-2 3.06 ™ Air Integrated Dive Computer User Manual CONTENTS IMPORTANT NOTICES ............................................................................................................................... 8 Definitions ..................................................................................................................................................... 9 User Agreement and Warranty ....................................................................................................................... 9 User Manual .................................................................................................................................................. 9 Liquivision Limitation of Liability ............................................................................................................... 10 Trademark Notice ........................................................................................................................................ 10 Patent Notice ............................................................................................................................................... 10 CE ............................................................................................................................................................... 10 LYNX
    [Show full text]
  • World-Wide Web Proxies
    World-Wide Web Proxies Ari Luotonen, CERN Kevin Altis, Intel April 1994 Abstract 1.0 Introduction A WWW proxy server, proxy for short, provides access to The primary use of proxies is to allow access to the Web the Web for people on closed subnets who can only access from within a firewall (Fig. 1). A proxy is a special HTTP the Internet through a firewall machine. The hypertext [HTTP] server that typically runs on a firewall machine. server developed at CERN, cern_httpd, is capable of run- The proxy waits for a request from inside the firewall, for- ning as a proxy, providing seamless external access to wards the request to the remote server outside the firewall, HTTP, Gopher, WAIS and FTP. reads the response and then sends it back to the client. cern_httpd has had gateway features for a long time, but In the usual case, the same proxy is used by all the clients only this spring they were extended to support all the within a given subnet. This makes it possible for the proxy methods in the HTTP protocol used by WWW clients. Cli- to do efficient caching of documents that are requested by ents don’t lose any functionality by going through a proxy, a number of clients. except special processing they may have done for non- native Web protocols such as Gopher and FTP. The ability to cache documents also makes proxies attrac- tive to those not inside a firewall. Setting up a proxy server A brand new feature is caching performed by the proxy, is easy, and the most popular Web client programs already resulting in shorter response times after the first document have proxy support built in.
    [Show full text]
  • Web Browsing and Communication Notes
    digital literacy movement e - learning building modern society ITdesk.info – project of computer e-education with open access human rights to e - inclusion education and information open access Web Browsing and Communication Notes Main title: ITdesk.info – project of computer e-education with open access Subtitle: Web Browsing and Communication, notes Expert reviwer: Supreet Kaur Translator: Gorana Celebic Proofreading: Ana Dzaja Cover: Silvija Bunic Publisher: Open Society for Idea Exchange (ODRAZI), Zagreb ISBN: 978-953-7908-18-8 Place and year of publication: Zagreb, 2011. Copyright: Feel free to copy, print, and further distribute this publication entirely or partly, including to the purpose of organized education, whether in public or private educational organizations, but exclusively for noncommercial purposes (i.e. free of charge to end users using this publication) and with attribution of the source (source: www.ITdesk.info - project of computer e-education with open access). Derivative works without prior approval of the copyright holder (NGO Open Society for Idea Exchange) are not permitted. Permission may be granted through the following email address: [email protected] ITdesk.info – project of computer e-education with open access Preface Today’s society is shaped by sudden growth and development of the information technology (IT) resulting with its great dependency on the knowledge and competence of individuals from the IT area. Although this dependency is growing day by day, the human right to education and information is not extended to the IT area. Problems that are affecting society as a whole are emerging, creating gaps and distancing people from the main reason and motivation for advancement-opportunity.
    [Show full text]
  • GSC3000, VRC2500 Manual
    GSC3000 VRC2500 Broadcast Facility Control Systems INSTALLATION & OPERATION MANUAL 5 SERIES Includes Instructions for Lynx Software GSC3000 & VRC2500 Installation & Operation Manual System Series 5 Lynx Software version 5.1 Revision B (November 2006) Copyright © 2006 Burk Technology, Inc. All rights reserved. No part of this manual may be reproduced in any form or by any means without written permission from Burk Technology. Information in this manual is subject to change without notice. Contents CHAPTER 1: INTRODUCTION .................................................................................................................1 Contacting Burk Technology.......................................................................................................................................................1 Unpacking........................................................................................................................................................................................2 VRC2500 ..............................................................................................................................................................2 GSC3000 I/O 8 & I/O 16 unit............................................................................................................................3 Voice Interface Unit................................................................................................................................................3 Command Relay Unit..............................................................................................................................................4
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • 685-LYNX-CLIENT-0 V10.0 Lynxclient Manual 11-24-14.Cdr
    Installation Guide for LynxClient Technical Support: 972-231-6874 Ext. 140 8am to 5pm CST Email: [email protected] PC Keyboard Duress Button USB Duress Button LynxKey & LynxKeyPro LynxUSB Notification Popup on PCs LynxMessenger Multi-Function Client Software Version 10.0 Micro Designed and Manufactured by Technology Services, Inc. Installation Guide Part Number 685-LYNX-CLIENT-0 Rev 016 Table of Contents LynxClient Overview 2 Upgrading LynxMessenger 6 Client Seats 2 Configuring LynxMessenger 6 Requirements 2 Configuring Profiles 7 Pre Deployment Considerations 3 Keyboard Alarm Settings 8 Types of Deployments 3 LynxMessenger Settings 8 Location Information 3 LynxUSB Settings 9 Dormant Profiles 4 LynxClient Testing 9-11 Selectable Keyboard Combinations 4 LynxClient Supervision 11 Keyboard Labels 4 LynxUSB Supervision 11 Compatible LynxUSB Devices 4 Large Deployment Supervision 11 Pre Deployment Pilot Test Group 4 LynxClient System Tray Icons 12 LynxClient Software Installation 5 Troubleshooting - LynxClient 13 Software Distribution using SCCM 5 Troubleshooting - LynxUSB Button 13 Upgrading Existing LynxKeyPro Clients 6 LynxClient Manual Installation 13 LynxClient Overview The LynxClient software allows a PC to send alarms to the LynxGuide server or receive popup notifications from the server. All Lynx client side functionality is contained in the LynxClient software, and functions are enabled or disabled from the server. The LynxClient software can be loaded on any Windows PC manually or deployed with software distribution tools. The LynxClient multi-function software can be configured to support LynxMessenger, LynxKey, LynxKeyPro and LynxUSB. LynxMessenger allows a PC to receive a popup notification when an alarm is activated. The popup will be displayed in your default web browser and take focus.
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • 6.824 Lab 1: a Simple Web Proxy
    6.824 - Fall 2002 6.824 Lab 1: A simple web proxy Introduction Please read "Getting started with 6.824 labs" before starting this assignment. You will also need "Using TCP through sockets" at a later stage. In this lab assignment you will write a simple web proxy. A web proxy is a program that reads a request from a browser, forwards that request to a web server, reads the reply from the web server, and forwards the reply back to the browser. People typically use web proxies to cache pages for better performance, to modify web pages in transit (e.g. to remove annoying advertisements), or for weak anonymity. You'll be writing a web proxy to learn about how to structure servers. For this assignment you'll start simple; in particular your proxy need only handle a single connection at a time. It should accept a new connection from a browser, completely handle the request and response for that browser, and then start work on the next connection. (A real web proxy would be able to handle many connections concurrently.) In this handout, we use client to mean an application program that establishes connections for the purpose of sending requests[3], typically a web browser (e.g., lynx or Netscape). We use server to mean an application program that accepts connections in order to service requests by sending back responses (e.g., the Apache web server)[1]. Note that a proxy acts as both a client and server. Moreover, a proxy could communicate with other proxies (e.g., a cache hierarchy).
    [Show full text]
  • BROWSERS: a Brief Historyof Securityvulnerabilities
    BROWSERS: A brief history oF PROJECT BY GROUP 5 SNEHA BALIGA / JULIA CHLASTACZ / DANG TRUNG NGUYEN / MARIJA NIKOLIC / BOGDAN NOVAKOVIC / PREETI PURI / security vulnerabilities CHENYUN ZENG 2.8.9 Lynx Vulnerabilities refer to Thomas Netscape Navigator 8.1.3 the Common Vulnerabilities Dickey Netscape and Exposures (CVE) - a system 75.1 that provides a reference method for publicly known information - K-Meleon security vulnerabilities and exposures. Netscape Netscape created the Mozilla Organization in Vulnerabilities 1998 to co-ordinate the development of the 69 Mozilla Application Suite. Netscape acquired AOL Firefox Risk severity in 1999 and went on to create multiple browsers. AOL Phoenix Critical 1.5 High AOL Medium 2.49 Low Seamonkey Risk refers to the potential that 28.7 the threat will be realized for a particular vulnerability. Palemoon 12.18 Number of open Opera vulnerabilities Opera Software 1,200 11.0 1,000 800 Internet 600 Explorer 400 Microsoft 44.0 200 Microsoft created Edge in 2015 in an 0 attempt to phase out Internet Explorer. Edge Open vulnerabilities refer to 11.4 the number of vulnerabilities open Amaya and unresolved in that year. W3C, INRIA 3.34 Konqueror Usage share KDE 0.11 ELinks 0% Twibright 5.2 Relationship lines Labs Maxthon 1 50% Maxthon International 3.34 Company Name GNOME Web 100% Epiphany 1 1 Successor browser GNOME Project Usage share refers to the 12.1 percentage of user share in Forked from another browser the browser market. Safari Apple Only 7 browsers accomodate 19 usage share of more than 1%. Symbols
    [Show full text]
  • 01-Www-Intro.Pdf
    The WWW and HTML CMPT 281 Outline • Hypertext • The Internet • The World-Wide-Web • How the WWW works • Web pages • Markup • HTML Hypertext • Hypertext is text displayed on a computer that contains links (‘hyperlinks’) to other locations in that document or other documents History of Hypertext • Vannevar Bush and the Memex • Ted Nelson and Xanadu • Douglas Englebart and NLS Vannevar Bush The Memex • 1945! • An information-storage machine with many mechanisms for retrieving information • Trails of links connecting sequences of information • Storage based on microfilm • Never built The Memex Ted Nelson Ted Nelson Xanadu • 1967 • Invented the term ‘hypertext’ • Documents made of other pieces • Two-way links • Document version control Ted Nelson’s vision of hypertext • Ted Nelson, a professional visionary, wrote in 1965 of "Literary Machines," computers that would enable people to write and publish in a new, nonlinear format, which he called hypertext. Hypertext was "nonsequential" text, in which a reader was not constrained to read in any particular order, but could follow links and delve into the original document from a short quotation. Ted described a futuristic project, Xanadu, in which all the world's information could be published in hypertext. For example, if you were reading this book in hypertext, you would be able to follow a link from my reference to Xanadu to further details of that project. In Ted's vision, every quotation would have been a link back to its source, allowing original authors to be compensated by a very small amount each time the quotation was read. He had the dream of a utopian society in which all information could be shared among people who communicated as equals.
    [Show full text]