.com, .gov, .net, .edu, .org: When these letters appear in lowercase type at the end of an address, they indicate what type of organization operates the host computer. It also means that the host computer is most likely located in the United States.
.gif: Graphics Interchange Format - Developed by Compuserve, using Unisys compression technology, for handling vector graphics - line drawings - on the Web.
.jpg: File extension for a JPEG (Joint Photographic Experts Group) file type. A group that has defined a compression scheme that reduces the size of image files by up to 20 times at the cost of slightly reduced image quality.
.mpeg: Short for Moving Picture Experts Group, and pronounced m-peg, the term also refers to the family of digital video compression standards and file formats developed by an international organization standards group. MPEG generally produces better-quality video than competing formats, such as Video for Windows, Indeo and QuickTime. MPEG files can be decoded by special hardware or by software.
Address Bar: An editable space in your browser window that you can type in a web address (e.g. www.penteledata.net ) or web page you want to view.
Address book: (email) Storage of commonly used email addresses and contact information in an email type program such as Microsoft Outlook.
Anti-virus Software: Antivirus (or "anti-virus") software is a class of programs that searches your hard drive and floppy disks for any known or potential viruses.
Attachment (email): An email attachment is another type of file not created by an email program such as Outlook Express, Eudora, or Netscape. Attachments are frequently text documents created by a word processor such as MS Word, a picture created by a graphics program, or an application that can be run on a Macintosh or PC.
Authentication: The process of establishing the authenticity of an object (e.g. authentication of a user by password or signature).
Bandwidth: The amount of data that can be sent through a connection, usually measured in bits-per-second.
Baud Rate: The baud rate of a modem refers to the speed of the modem. It will tell you how many bits the modem can send or receive per second. For example, a 28.8 baud modem can send or receive 28,800 bits per second (bps).
Bookmark: A name or address of an Internet resource stored in a software file on a user's computer for convenient future use. Note: An example of a bookmark is an entry in a bookmark file (or list) maintained by a browser for the convenience of the user in revisiting a website.
Bounce back message: When a user attempts to send an email, he is telling his email system to look for the domain of the recipient (for example, ptd.net) and the domain's mail server. Once the email system makes contact with the recipient's mail server, the mail server looks at the message to determine if it will let the message pass through the server. If the recipient's server has predetermined that it is not accepting emails from the sender's address (for example, if it has blocked the address for anti-spamming purposes), the server will reject the message and it will subsequently bounce back to the sender. The message will also bounce back to the server if the mail server on the recipient's end is busy and cannot handle the request at that time. When an email is returned to the sender without being accepted by the recipient's mail server, this is called a hard bounce.
Browser: An application used for accessing the World Wide Web (WWW). To 'browse' is to search the WWW for information. Examples of browsers include: Internet Explorer, Google's Chrome, Mozilla's Firefox, Opera, and Apple Computer's Safari.
Bps: Bits per second. A measurement of how fast data is transmitted from one place to another. A 28.8 modem can move 28,800 bits per second.
Cable Modem: A modem designed to operate over cable TV lines. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines, a cable modem can be used to achieve extremely fast access to the World Wide Web.
Cache: Pronounced cash, a special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device. Two types of caching are commonly used in personal computers: memory caching and disk caching.
Chat Room: A virtual room where a chat session takes place. Technically, a chat room is really a channel, but the term room is used to promote the chat metaphor.
Cookies: A mechanism for server-side connections to store and retrieve information on the client side.
Cyberspace: A virtual universe of networked computers, programs, and data.
Daemon: Pronounced DEE-mun or DAY-mun. A process that runs in the background and performs a specified operation at predefined times or in response to certain events. The term daemon is a UNIX term, though many other operating systems provide support for daemons, they're sometimes called other names. Windows, for example, refers to daemons as System Agents and services.
Default: A value or setting that a device or program automatically selects if you do not specify a substitute. For example, word processors have default margins and default page lengths that you can override or reset.
Desktop: In graphical user interfaces, a desktop is the metaphor used to portray file systems. Such a desktop consists of pictures, called icons, that show cabinets, files, folders, and various types of documents (that is, letters, reports, pictures). You can arrange the icons on the electronic desktop just as you can arrange real objects on a real desktop - moving them around, putting one on top of another, reshuffling them, and throwing them away.
Dial-up: A form of Internet connection for your home. Dial-up is a connection from your computer to the Internet over a telephone line via an Internet Service Provider like PenTeleData.
Dial-up Networking: A component in Windows that enables you to connect your computer to a network via a modem. If your computer is not connected to a local area network (LAN) and you want to connect to the Internet, you need to configure Dial-up Networking (DUN) to dial a Point of Presence (POP) and log into your Internet Service Provider (ISP).
You can access DUN through the "My Computer" icon in Windows 95/98 and through the Start menu in Windows ME. In Windows XP, you can configure DUN through the "Control Panel."
Digital: Describes any system based on discontinuous data or events. Computers are digital machines because at their most basic level they can distinguish between just two values, 0 and 1, or off and on. There is no simple way to represent all the values in between, such as 0.25. All data that a computer processes must be encoded digitally, as a series of zeroes and ones.
The opposite of digital is analog. A typical analog device is a clock in which the hands move continuously around the face. Such a clock is capable of indicating every possible time of day. In contrast, a digital clock is capable of representing only a finite number of times (every tenth of a second, for example).
Disk Space: Disk space is the storage capacity of your Web site for pictures, HTML, graphics, etc. and is usually expressed in MB.
DOCSIS: Data Over Cable Service Interface Specification defines interface standards for cable modems and supporting equipment. DOCSIS specifies downstream traffic transfer rates between 27 and 36 Mbps over a radio frequency (RF) path in the 50 MHz to 750+ MHz range, and upstream traffic transfer rates between 320 Kbps and 10 Mbps over a RF path between 5 and 42 MHz. But, because data over cable travels on a shared loop, individuals will see transfer rates drop as more users gain access.
Domain Name: A domain name is a name which is used to find a specific location on the Internet. Domain names are tied to specific IP addresses assigned to given hosts. While domain names are not necessary to find given hosts on the Internet, they are much easier to remember. For example, PenTeleData.net is a domain. If you wanted to go to PenTeleData's web page, you could enter www.penteledata.net into your browser.
Download: To retrieve a file from another machine, usually a host machine, to your machine.
DSL (Digital Subscriber Line): DSL is a technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines. xDSL refers to different variations of DSL, such as ADSL, HDSL, and RADSL. With DSL service, you may be able to receive data at rates up to 6.1 Mbps, enabling continuous transmission of motion video, audio, and even 3D effects. A DSL line can carry both data and voice signals.
eBay: Founded in September 1995, eBay (www.ebay.com) is an online marketplace for the sale of goods and services by a diverse community of individuals and businesses. Today, the eBay community includes tens of millions of registered members from around the world. It has been reported that people spend more time on eBay than any other online site, making it the most popular shopping destination on the Internet.
EMail: Email, or electronic mail, is a method of sending text messages from one person's computer to another through the Internet. An email address would look something like firstname.lastname@example.org .
EMailbox: An emailbox is a storage area for email. A user receives their private emailbox. This is similar to a Post Office Box except electronic.
EMail Forwarding: Email forwarding gives you the ability to have email that is sent to one email address automatically forwarded to another email address.
For example, you could have all email sent to email@example.com forwarded to firstname.lastname@example.org.
Encryption: The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.
Ethernet: A technology, which allows you to network machines together in a local area network (LAN). Ethernet is commonly used because of its incredible speed and scalability.
FAQ (Frequently Asked Questions): A list of commonly asked questions and answers that are related to the features and procedures of a company's products and services. A "FAQ" acts as a help file for the end user.
Favorites: - See "Bookmarks".
File Sharing (peer to peer): File sharing is the public or private sharing of computer data or space in a network with various levels of access privilege. While files can easily be shared outside a network (for example, simply by handing or mailing someone your file on a storage device), the term file sharing almost always means sharing files in a network, even if in a small local area network. File sharing allows a number of people to use the same file or file by some combination of being able to read or view it, write to or modify it, copy it, or print it.
Filter: A program that accepts a certain type of data as input, transforms it in some manner, and then outputs the transformed data. For example, a program that sorts names is a filter because it accepts the names in unsorted order, sorts them, and then outputs the sorted names.
Firewall: A firewall is a security device that allows you to prevent unwanted accesses into, or out of, your network. A simple firewall can be built by installing firewall software on a computer linked to a network.
Freeware: Copyrighted software given away for free by the author. Although it is available for free, the author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it.
F.T.P. (File Transfer Protocol): This protocol is used for downloading and uploading files over the Internet. With FTP, you can log into another Internet site and send or receive files. Some sites have public files that you can access via FTP by using the account name "anonymous" and your email address as the password. This type of access is called "anonymous" FTP.
GHz: Abbreviation for gigahertz. One GHz represents 1 billion cycles per second. The speed of microprocessors, called the clock speed, often is measured in gigahertz. For example, a microprocessor that runs at 200 GHz executes 200 billion cycles per second. Each computer instruction requires a fixed number of cycles, so the clock speed determines how many instructions per second the microprocessor can execute.
Gigabyte: ("gig") 1 gigabyte = approximately 1 billion bytes. More accurately, 1 gigabyte = 2 to the 30th power or 1,073,741,824 bytes.
Hacker: A slang term for a computer enthusiast (i.e. a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subjects). Among professional programmers, the term can be either complimentary or derogatory, although it is developing an increasingly derogatory connotation. The negative sense of "hacker" is becoming more prominent largely because the popular press has begun using the term to refer to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data. Hackers, themselves, maintain that the proper term for such individuals is "cracker."
Header: In many disciplines of computer science, a header is a unit of information that precedes a data object. In a network transmission, a header is part of the data packet and contains transparent information about the file or the transmission. In file management, a header is a region at the beginning of each file where bookkeeping information is kept. The file header may contain the date the file was created, the date it was last updated, and the file's size. The header can be accessed only by the operating system or by specialized programs.
Home Page: A home page most often refers to the web page you see when you first start up your web browser. It can also refer to the first page that appears when you visit a specific site like www.ptd.net
Host: A computer on the Internet you may be able to log on to. You can use FTP to get files from a host computer, and use other programs (such as telnet) to make use of the host computer.
HTML: Hyper Text Markup Language, is the most common language used to create web pages. HTML is a language, which essentially formats text and images in any number of ways. HTML also allows you to create links which will point people to various other parts of that web site, or to other web sites altogether.
HTTP: Hyper Text Transfer Protocol is the protocol that is used to transfer web pages across the Internet.
Hyperlink: An element in an electronic document that links to another place in the same document or to an entirely different document. Typically, you click on the hyperlink to follow the link. Hyperlinks are the most essential ingredient of all hypertext systems, including the World Wide Web.
iMac: The iMac is a low-cost version of Apple Computer's Macintosh. The iMac was designed to attract people who have never owned a personal computer and also to win back former Mac users who have moved to a personal computer. Released in mid-August, 1998, the initial version of the iMac featured a sleekly-molded designer-colored translucent case with a built-in 15-inch display, a fast 233 MHz processor, and the Mac OS operating system.
IMAP: Short for Internet Message Access Protocol, a protocol for retrieving email messages. The latest version, IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your email messages for keywords while the messages are still on the mail server. You can then choose which messages to download to your machine.
Inbox: The collection station for all incoming email, commonly broken down into directories and subdirectories for easy identification and categorization of correspondence.
Instant Messenger: Free software users can install on their workstation to chat in real time with other users on the Internet who are using the same program.
Internet: The Internet is made up from the millions of servers which are interconnected via the TCP/IP protocol. The Internet evolved from its humble beginnings as the ARPANET in the late 60's and early 70's.
Intranet: An intranet is like a small private Internet, which is intended to be accessed by a specific group or groups of computers. Often companies will set up intranets for their own internal use to allow employees to see company information without allowing access to this private information by the entire Internet.
IP Address: An IP address is the address given to each computer that is on the Internet. Without an IP address, a computer cannot communicate with the rest of the computers on the Internet. These addresses have 4 parts, known as octets, and are separated by dots; e.g., 18.104.22.168.
IRC (Internet Relay Chat): A system that enables Internet users to talk with each other in real time over the Internet rather than in person.
ISDN: Integrated Services Digital Network: A way to move more data over existing regular phone lines. ISDN is only slowly becoming available in the USA. ISDN can provide speeds of 64,000 bits per second over a regular phone line at almost the same cost as a normal phone call.
ISP: (Internet Service Provider) for example, PenTeleData Internet Service.
IST: Integration Service Team: PenTeleData's Integration Service Team is a specialized unit that caters to schools, businesses, and professionals within PenTeleData, the leading Technology and Internet service firm throughout the tri-state area. We use our expertise to help you from beginning to end. Our IST within PenTeleData will design, install, train, support and service your technological solution.
Java: Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. Java source code files (files with a .java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).
LAN (Local Area Network): A LAN, or Local Area Network, consists of a network of machines confined to one geographic area, such as an office building.
Limited Access: The opposite of unlimited access: reduced user access to a network or the Internet.
Links: By inserting hypertext links into web documents it is possible to connect two documents together. These documents can be on different computers on opposite sides of the globe.
Listserv: A family of programs that manages mailing lists by distributing messages posted to the list, adding and deleting members automatically.
Login: A noun or a verb. Noun: The account name used to gain access to a computer system. Unlike a password, the login name is not a secret. Verb: The act of entering into a computer system; for example, "Login to the WELL and then go to the GBN conference."
Mac Address: Short for Media Access Control address, a Mac address is a hardware address that uniquely identifies each node of a network.
Mail client: An application that runs on a personal computer or workstation and enables you to send, receive and organize email. It's called a client because email systems are based on client-server architecture. Mail is sent from many clients to a central server, which re-routes the mail to its intended destination.
Mail Server: A mail server is usually a program that runs on a computer designated exclusively for the processing and storage of user email.
Mailing list: A list of email addresses identified by a single name, such as email@example.com . When an email message is sent to the mailing list name, it is automatically forwarded to all the addresses in the list.
Mail-Me: A Mail-Me account provides a user the ability to dial into any local PenTeleData location and connect to the mail server to retrieve Email. This is ideal for someone who would like the convenience of Email but does not need access to the World Wide Web. This account does not provide the ability to surf the Internet. If you're already connected to the Internet, you can Telnet into your Mail Me account to send and receive Email. If you aren't already online, you can dial into any of our locations using a VT100 compatible terminal program (not compatible using Microsoft Dial-up Networking) and use a text-based, ASCII email program such as Pine to send and retrieve email. Using this type of dial-in connection doesn't require any additional software. In fact, the dialing Terminal Program used to dial in is included with a standard Windows operating system. Detailed instructions for the use of this program are readily available in the Help section of your Windows software and elsewhere online.
Mbps: Short for megabits per second, a measure of data transfer speed (a megabit is equal to one million bits). Network transmissions, for example, are generally measured in Mbps.
MHz: An abbreviation for megahertz. One MHz represents one million cycles per second. The speed of microprocessors, called the clock speed, is sometimes measured in megahertz. For example, a microprocessor that runs at 900 MHz executes 900 million cycles per second. Each computer instruction requires a fixed number of cycles, so the clock speed determines how many instructions per second the microprocessor can execute.
Modem: MOdulator, DEModulator: A device that you connect to your computer and to a phone line to allow the computer to talk to other computers through the phone system. Modems convert the computer's digital signals into analog waves that can be transmitted over standard voice telephone lines. Modem speeds are measured in bits per second (bps)-also sometimes expressed as Kilobits (thousands of bits) per second.
Modem Driver: The piece of software that allows your operating system (e.g. Windows, Mac OS, UNIX) to communicate with your modem. One of the essential steps in keeping your dial-up Internet connection running smoothly is updating your modem driver. For today's modems, drivers are much more important than the definitions make them sound.
Network: A network is 2 or more computers connected together (commonly using Ethernet) to allow for file and resource sharing.
Newsgroups: A Newsgroup is an on-line discussion group. On the Internet, there are literally thousands of newsgroups covering every conceivable interest. To view and post messages to a newsgroup, you need a news reader, a program that runs on your computer and connects you to a news server on the Internet.
News Reader: Sometimes spelled as one word, a news reader is a client application that enables you to read messages posted to Internet newsgroups, and to post your own messages. Both Microsoft Internet Explorer and Netscape Navigator come with news readers, but there are also freeware, shareware and commercial stand-alone news readers.
Node: Any given computer connected to a network.
Outbox: Collection station for outgoing correspondence before it's released through the gateway separating your local machine from a larger network, including the Internet.
Packet: A chunk of information sent over a network. Each packet contains the destination address, the sender's address, error-control information, and data.
PADLOCK®: A revolutionary new service offered by PenTeleData, PADLOCK® is an easy to use, cost-effective way to regulate traffic flowing in and out of any company's Internet connection: protect your company's interests by implementing a PADLOCK® filtering solution from PenTeleData.
Password: A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.
PC: Short for personal computer or IBM PC. The first personal computer produced by IBM was called the PC, and increasingly the term PC came to mean IBM or IBM-compatible personal computers, to the exclusion of other types of personal computers, such as Macintoshes.
Ping: A command/utility to determine whether a specific IP address is accessible. It works by sending a packet to the specified address and waiting for a reply. Ping is used primarily to troubleshoot Internet connections.
Plug-in: A hardware or software module that adds a specific feature or service to a larger system. For example, there are a number of plug-ins for the Netscape Navigator browser that enables it to display different types of audio or video messages.
POP: Short for Post Office Protocol, a protocol used to retrieve email from a mail server. Most email applications (sometimes called an email client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol).
also…Short for Point of Presence, a telephone number that gives you dial-up access. Internet Service Providers (ISPs) generally provide many POPs so that users can make a local call to gain Internet access.
Pop-up Window: A window that suddenly appears (pops up) on your desktop while surfing the WWW or when you select an option with a mouse or press a special function key. Pop-up windows that appear while browsing the Internet usually contain advertisements and will remain on the screen until you close them. Those pop-ups that appear when selecting an option or pressing a function key usually contain a menu of options and stay on the screen until you select one of the options.
Pop-up Stopper: Software any PenTeleData user is free to download without charge to install on his workstation which bars the presence of distracting pop-up web browser advertisements from appearing.
Port: An interface on a computer to which you can connect a device. PCs have various types of ports (e.g. USB, serial, parallel, PS/2).
A second type of port on a computer is a communications port. These ports allow the computer to communicate with other computers over a network or the Internet. Such ports are not visible but are assigned specific names and numbers. For example, computers usually use TCP port 25 to send and receive email, and TCP port 80 is used to send and receive most web pages.
PPP: or Point to Point Protocol, is the protocol that is used to make an Internet connection using an analog modem and a phone line.
Proxy: A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.
QuickTime: A video and animation system developed by Apple Computer. QuickTime is built into the Macintosh operating system and is used by most Mac applications that include video or animation. PCs can also run files in QuickTime format, but they require a special QuickTime driver. QuickTime supports most encoding formats, including Cinepak, JPEG, and MPEG. QuickTime is competing with a number of other standards, including AVI and ActiveMovie.
Real Player: A brand name in streaming audio & video software, designed to allow personal computer users to send and receive audio, video, and other multimedia services throughout the WWW.
Remote Access: When you access a computer that you are unable to see. This is done via a modem or computer network.
Router: A router is a piece of equipment that determines where to send pieces of data between networks. Because there may be multiple paths between 2 or more networks, a router will also determine the best path for that data so that it finds its destination quickly and successfully.
Search Engine: A software program, found on-line, that searches a database, gathers and then reports the information onto a page to be viewed. The information contained is related to the specified terms that were requested. (example: web sites, newsgroups)
Security Certificate: A chunk of information that is used by the Secure Socket Layer protocol to establish a secure connection. In order for an SSL connection to be created, both sides must have a valid Security Certificate.
Server: A server is a machine that provides a service to software running on other machines. For example, a web browser (the client) must communicate with a web server in order to display web pages. It is possible for one server to perform many roles depending on how many server software packages are installed on it.
Service Provider: A service provider is a company that supplies Internet services to personal users or business. Among other things they provide access to the Internet or somewhere to place Web Pages making them available to the WWW. You pay the service provider a set fee.
Shareware: Software distributed on the basis of an honor system. Most shareware is delivered free of charge, but the author usually requests that you pay a small fee if you like the program and use it regularly. By sending the small fee, you become registered with the producer so that you can receive service assistance and updates. You can copy shareware and pass it along to friends and colleagues, but they too are expected to pay a fee if they use the product.
Shopping Cart: A shopping cart is a piece of software that acts as an online store's catalog and ordering process. Typically, a shopping cart is the interface between a company's web site and its deeper infrastructure, allowing consumers to select merchandise; review what they have selected; make necessary modifications or additions; and purchase the merchandise.
SMTP: Simple Mail Transport Protocol, is the protocol used to send electronic mail over the Internet.
Spam: An inappropriate use of email, mailing lists, USENET (newsgroups), or other communication methods by sending a message to someone who didn't ask for it. Spam is analogous to junk mail that you receive in your mail box. Spam is generally sent to multiple people at one time for the purpose of advertising a business (beware the "Make Money Fast" email), propagate chain mail ("Send this message to 10 people", etc) or interest you in going to various web sites (commonly adult oriented in nature). Apart from being bad etiquette, sending SPAM from your PenTeleData account is prohibited. (From most ISP accounts)
Spyware: Also called adware, spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about email addresses and even passwords and credit card numbers.
SSL: Short for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a public key to encrypt data that's transferred over the SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http:.
T1: The T1 carrier is the most commonly used digital line in the United States, Canada, and Japan. In these countries, it carries 24 pulse code modulation (PCM) signals using time-division multiplexing (TDM) at an overall rate of 1.544 million bits per second (Mbps). T1 lines use copper wire and span distances within and between major metropolitan areas. A T1 Outstate System has been developed for longer distances between cities.
T3: Another level, the T-3 line, provides 44.736 Mbps, is also commonly used by Internet service providers.
TCP/IP (Transfer Control Protocol/Internet Protocol): The system that networks use to communicate on the Internet.
Telnet: The command and program used to login from one Internet site to another. The Telnet command/program gets you to the "login" prompt of another host.
Temporary files: Temporary files, by definition, are intended to be just that - temporary - and are not meant to be saved indefinitely.
Terminal: A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Usually you will use terminal software in a personal computer - the software pretends to be ("emulates") a physical terminal and allows you to type commands to a computer somewhere else.
Terms of Service: A stated list of the terms that must be agreed on by a user of a particular service; the terms under which a service provider provides a particular service.
Timeout: A time limit for an operation. If the timeout period expires before the operation completes successfully, some default or alternative action is taken.
Toolbar: A series of selectable buttons in a Graphical User Interface (GUI) that give the user an easy way to select desktop, application or web browser functions. Toolbars are typically displayed as either a horizontal row or a vertical column around the edges of the GUI where they are visible while the application is in use. Most applications use toolbars as they give the user another option aside from pull-down menus.
Upload: To transmit data from a computer to a bulletin board service, mainframe, or network. For example, if you use a personal computer to log on to a network and you want to send files across the network, you must upload the files from your PC to the network.
URL: A URL, or Uniform Resource Locator, is the address of any resource on the Internet such as a web page, an FTP site, or a newsgroup; e.g., http://www.penteledata.com. If someone asks you for your web address, they're really asking you for the URL.
Usenet: An informal group of systems that exchange "news." USENET predates the Internet, but today, the Internet is used to transfer much of USENET's traffic.
Username: A name used to gain access to a computer system. Usernames, and often passwords, are required in multi-user systems. In most such systems, users can choose their own usernames and passwords.
Virus: A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
WAN (Wide Area Network): Any Internet or network that covers an area larger than a single building or campus. (See also: Internet, LAN (Local Area Network) or network)
Web address: The location, or URL, of a website, file, or resource on the Internet. For example, http://www.penteledata.net/ is a web address.
Web page: A document on the World Wide Web. Every Web page is identified by a unique URL (Uniform Resource Locator).
World Wide Web: The World Wide Web (abbreviated as WWW or W3, commonly known as the web) is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks. (Wikipedia)
ZIP: A popular data compression format. Files that have been compressed with the ZIP format are called ZIP files and usually end with a .ZIP extension. A special kind of zipped file is a self-extracting file, which ends with a.EXE extension. You can unzip a self-extracting file by simply executing it.