Chapter 9 Flashcards
ARPANET ( Advanced Research Project Agency Network)
-First to use TCP/IP
- Earlier version of the internet
- Created for Academia, military, pentagon, to still have access to communicate with each other
- created by scientists at UCLA and the govt. in 1969 became known as the internet in 1990s
HTML (Hypertext Markup Language)
-invented by Tim Berners-Lee at CERN (Center for European Nuclear Research), in 1980s-90s
-standard programming language
Server
stores webpages on a network
client
requests the webpages
WWW
World Wide Web created after HTML and HTTP
HTTP
-moves information through the Internet
-developed to transfer information in a standard fashion that all computers on the Internet could receive
-rules of exchanging files from a server to a client on the Internet
domain code/extension
com: Commercial
.org: Organization
.net: Network
.int: International
.edu: U. S. Higher Education
.gov: U. S. National and State Governmental Agencies
.mil: U. S. Military
Website
a collection of web pages on a server that exists on the Web that can be requested by a client and displayed with a browser
web pages are typically programmed with HTML
hyperlink
a clickable navigation element, (typically text) which resides in a webpage
Web developers/ webmasters
People that produce websites
Aspects of a good website
Content
Interactivity- makes it memorable
Design
Browser
application software that provides an interface that allows a user to display and interact with text, images, and other information located on the World Wide Web
Safari, google chrome, firefox, interent explorer
Bookmarks
- also called “Favorites.”
- browser will catalog, or bookmark, frequently visited websites so the user doesn’t have to remember the page URL.
Caching
when the browser stores copies of previously viewed web pages that the user has already accessed that allows it to find them quickly without having to make another request to the originating server
Cookies
used for tracking and maintaining specific information about users, such as site preferences and the contents of their electronic shopping carts.
Graphic files (GIF, JPEG)
display images with Joint Photographic Expert Group (JPEG, pronounced JAY-peg) and Graphics Interchange Format (GIF) file formats.
JavaScript
client-side (user) programs that allow the browser to run small applications, like clocks and calendars that sometimes show up on a web page.
Popups
separate browser windows that are programmed by website designers to open extra browser windows without user interaction
Connectivity
when one computer can connect to one or many other computers and share information and resources.
Internet Service Provider (ISP)
a business or organization that provides people with a way to access the Internet and World Wide Web
Digital Subscriber Line (DSL)
may provide a combination of services including domain name registration and web hosting
broadband
high data-transmission rate Internet connection
search engine
a website that lets a user type in specific keywords or phrases and then returns a list of hits (hyperlinks) that best match the search criteria
(yahoo, google, bing)
Metasearch engines
look and work like keyword searches but return the results of many search engines at once and eliminate duplicates hits
Ecommerce
the distribution, buying, selling, advertising, and marketing of goods or services over the Web
Business-to-business (B2B)
businesses distributing, buying, selling, advertising, and marketing goods or services over the Web to other businesses
Business-to-consumer (B2C)
when commercial organizations sell to consumers over the Web
Consumer-to-consumer (C2C)
involves e-commerce between individuals and is typically facilitated by a third party like ebay
percentage responsible for selling to other businesses over the web
90%
virtual storefront
You don’t go into a store to shop it’s only online
Browser hijacking
when the browser’s settings are modified by Malware
Malware
software designed to damage a computer’s system without the owner’s knowledge
virus
malicious computer program that can copy itself and infect a computer, typically without the user being aware of it goes to personal computers
worm
is sent out for businesses and do not need to attach to something they can self replicate
Trojan horse
can go to personal or business looks innocent until it is opened
Spyware
best defined as software that installs itself on a user’s system without permission and gleans personal data and information about the user without their knowledge or permission like credit card info ss number, etc
Adware
software that routinely displays advertising to a computer system after the software is installed, usually without the user’s consent
a “store and forward” system of composing, sending, storing, and receiving messages over electronic communication systems like the Internet.
phishing
a fake email that when you click the link will download a virus onto your computer/phone
Spam email
unwanted mail like phishing,
Voice over Internet Protocol (VoIP)
the routing of voice conversations, or typically, phone calls over the Internet