Anything that comes out of a computer
Operating System (OS)
The program that allows you to access
the basic functions of your computer. It is the minimum software
required to run a program. Operating systems include DOS, Windows,
UNIX, Solaris, Macintosh, etc.
The term refers to anything that's on
Back to top
When you retrieve a document via the
internet, the document is sent in "packets" which fit
in between other messages on the telecommunications lines, and then
are reassembled when they arrive at your end. This occurs using
TCP/IP protocol. The packets may be sent via different paths on
the networks which carry the Internet. If any of these packets gets
delayed, your document cannot be reassembled and displayed. This
is called a "packet jam." You can often resolve packet
jams by pressing STOP then RELOAD. RELOAD requests a fresh copy
of the document, and it is likely to be sent without jamming.
Secret code of letters and numbers needed
to gain access to a time-sharing computer or FTP system, or to protect
PDF - .pdf or pdf file
Abbreviation for Portable Document Format,
a file format developed by Adobe Systems, that is used to capture
almost any kind of document with the formatting in the original.
Viewing a PDF file requires Acrobat Reader, which is built into
most browsers and can be downloaded free from Adobe.
Practical Extraction and Report Language.
A popular language for programming CGI applications. Perl is by
far the most popular language for CGI, because, among other things,
it has powerful string matching. Perl is an interpreted language
optimized for scanning arbitrary text files, extracting information
from those text files, and printing reports based on that information.
A web page created by an individual (as
opposed to someone creating a page for an institution, business,
organization, or other entity).
PHP is a widely-used general-purpose scripting language that is
especially suited for Web development and can be embedded into HTML.
More than one KEYWORD, searched exactly
as keyed (all terms required to be in documents, in the order keyed).
Enclosing keywords in quotations " " forms a phrase in
most search engines.
Packet InterNet Groper is a program and
UNIX command that helps testing and debugging network and/or Internet
connections. An 'Echo' command is sent to a specified computer and
then waits for a response. The result is a report that displays
the success or failure, usually a report back of a timed response
in seconds, of the intended action.
A file containing data used to alter,
enhance, or extend the operation of a parent application program.
Web browsers support plug-ins which display
or interpret a particular file format or protocol such as Shockwave,
RealAudio, Adobe PDF, Corel CMX (vector graphics). The file to be
displayed is included in a web page using an HTML tag.
Plug-ins, both commercially and independantly
authored, can usually be downloaded for free and are stored locally.
Plug-ins come in different versions specific to particular operating
Popularity Ranking of search results
Some search engines rank the order in
which search results appear primarily by how many other sites link
to each page (a kind of popularity vote based on the assumption
that other pages would create a link to the "best" pages).
Google and Raging Search are examples of this.
An HTTP request method. This method transmits
all form input information immediately after the requested URL.
Your CGI program will receive the encoded form input on.
Can refer to a message or article that
appears on a newsgroup or message board system, or the act of sending
an electronic message to a newsgroup or message board.
Abbreviation for Point to Point Protocol.
It is a protocol used for sending information via a modem which
is connected to the Internet.
The process of informing the world of
the presence of a web site.
The rules make possible the exchange of
messages between users on the Internet, or within any given network.
A computer that processes requests by
verifying source host information, destination host address, and
information about the requested service. If the communication checks
out against defined security policy, the request is allowed to pass
through to the real Web server.
Back to top