410-822-6110

 

 

INTERNET GLOSSARY OF TERMS

 

App
Short for "application" and popularized by Apple ("There's an app for that"), an app is a small computer software program. Typically associated with smart phones and other mobile devices such as tablets, apps can also run-on computers as well as smart TVs. Apps usually perform a specific function and can include games, productivity tools, online shopping and store finders, social networking, music streaming and more.

 

Authentication
The process or action of proving or showing something to be true, genuine, or valid.

 

Browser
A computer program with a graphical user interface for displaying and navigating between web pages. Examples include Google Chrome, Safari, Firefox, Microsoft Edge, Opera, etc.

 

Coax
A transmission line that consists of a tube of electrically conducting material surrounding a central conductor held in place by insulators and that is used to transmit telegraph, telephone, television, and Internet signals.

 

DNS (Domain Name Server)
A hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.

 

Download
Copy (data) from one computer system to another, typically over the internet. Taking information from a source.

 

Encryption
The process of converting information or data into a code, especially to prevent unauthorized access.

 

Ethernet
A system for connecting several computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

 

Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

 

Internet
A global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone." These lines are connected to major Internet hubs that distribute data to other locations, such as web servers and ISPs.

 

IP Address
A unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.

 

ISP (Internet Service Provider)
An organization that provides a myriad of services for accessing, using, or participating in the Internet. Internet service providers can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

 

Jitter
A variance in latency, or the time delay between when a signal is transmitted and when it is received. This variance is measured in milliseconds (ms) and is described as the disruption in the normal sequence of sending data packets.

 

LAN (Local Area Network)
A network that links together computers and peripheral equipment within a limited area, such as a building or a group of buildings.

 

Malware
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

 

Modem
A device that converts signals produced by one type of device (such as a computer) to a form compatible with another (such as a telephone) and that is used, especially to transmit and receive information between computers via landlines. This piece of equipment may be a box with the name “Arris”.

 

Phishing
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.

 

Ping
A signal sent to a host that requests a response. It serves two primary purposes: 1) to check if the host is available and 2) to measure how long the response takes.

 

Pre-shared Key
In cryptography, a pre-shared key is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used. Also known as a wireless password.

 

Router
A device whose software and hardware are designed to move data between computer networks. Routers make sure traffic between computers goes where it needs to go. This piece of equipment may be a box with a name such as: Netgear, Linksys, TP Link, Cisco, Belkin, etc.

 

Smishing
The fraudulent practice of sending text messages purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords or credit card numbers.

 

SSID (Service Set Identifier)
A unique ID that consists of 32 characters and is used for naming wireless networks. Also known as a network name.

 

Trojan
A type of malware that is often disguised as legitimate software.

 

Upload
Transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server. Sending data to a source.

 

URL
The address of a web page.

 

WAN (Wide Area Network)
A telecommunications network that extends over a large geographic area for the primary purpose of computer networking. Wide area networks are often established with leased telecommunication circuits.

 

Web page
A hypertext document on the World Wide Web.

 

Wi-Fi
A facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.

 

Wireless
Broadcasting, computer networking, or other communication using radio signals, microwaves, etc.

 

WPS (Wi-Fi Protected Setup)
A network security standard to create a secure wireless home network.