Thursday, 8 September 2016

Internet Glossary Task

Broadband
Broadband Internet service truly is most used form of Internet access because of its high access speeds

Browser
A browser is software that is used to access the internet. A browser lets you visit websites and do activities within them like login, view multimedia, link from one site to another.

Chat
Chat is a text-based communication that is live or in real-time.

Cloud computing
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Domain name
Domain Name System or DNS is the friendly naming system for giving addresses to web servers and web pages. For example: com

Download
Downloading is the transmission of a file from one computer system to another

Driver
In computing, a device driver (commonly referred to as a driver) is a computer program that operates or controls a particular type of device that is attached to a computer. For example: printer driver.

Emoticon
An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression that complements a text message.

Firewall
A firewall is a network security system, either hardware -or software- based, that controls incoming and outgoing network traffic based on a set of rules.

HTML
HTML is short for Hypertext Mark-up Language. That may sound scary. Put in simply means it is a language for describing web-pages using ordinary. HTML is not a complex programming language.

Internet
The internet can be defined as the wired or wireless mode of communication through which one can receive, transmit information that can be used for single or multiple operations

ISP
An Internet Service Provider (ISP) is the industry term for the company that is able to provide you with access to the Internet, for example: Optus.

Login name
A unique sequence of characters used to identify a user and allow access to a computer system, computer network, or online account.

Modem
Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over.

Netiquette
The correct or acceptable way of using the Internet.

Internet Glossary:

Plug-in
Plug-in applications are programs that can easily be installed and used as part of your Web browser, for example: silver light.

Search engine
A browser, short for web browser, is the software application (a program) that you’re using right now to search for, reach and explore websites.

Server
In information technology, a server is a computer program that proides services to other computer programs in the same or other computers

Upload
Transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.

URL
URL is the abbreviation of Uniform Resource Locator. URL is the global address of documents and other resources on the World Wide Web.

VOIP
VOIP (Voice over Internet Protocol) is an exciting technology that is changing the way people talk.

Webcam
A webcam is a hardware camera connected to a computer that allows anyone connected to the Internet to view either still pictures or motion video of a user or other object.

World Wide Web

The World Wide Web (WWW) is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet.
Email Protocols

                 It is compulsory for academic person to understand and accept email protocols. People send and receive so many message a day, many end up making embarrassing mistakes that could be detrimental in a professional interaction.
      First of all, it should be clear, who the email is coming from and include contact details in any signature so people can get in contact with you, also the email should start with appropriate form of address like Mr.  Mrs. The aim of form of address is to greet the reader with all due respect

         Secondly ,if you have plan to send exactly same file to another person.it is better to use blind copies as privacy  before sending any documents  furthermore, it is obviously clear that  your attachment file should contain header include topic  ,footer are in the correct order ,page number, files name,…etc. The main reason regarding to use above protocol is, every things be clear and understandable


           Finally, in order to protect email from hackers, should be aware of how to change some option’s in setting section, regarding to make double step verification in order to raise the level of protection.

Wednesday, 7 September 2016