Googley Words & Terms Flashcards
Browser Session Cookies
It’s a mechanism for recognizing multiple requests from the same browser. It’s a conversation or a meeting between two or more communicating devices, or between computer and user.
A login session is the period of activity between a user logging in and logging out of a (multi-user) system.
Webpages have no memories. A user going from page to page will be treated as a completely new visitor. Session cookies enable the website you are visiting to keep track of your movement so you don’t get asked for the same information you’ve already given. Cookies allow you to proceed through many pages quickly and easily w/o having to authenticate or reprocess each new area you visit.
A cookie, like a key, enables swift passage from one place to the next. Without a cookie every time you open a new web page the server where that page is stored will treat you like a completely new visitor.
Authentication
the act of authentication means you are establishing whether something or someone is what it or he claims to be.
In private and public networks, this is typically verified through a login process. Logically, authorization precedes authentication (although they are often combined).
Digital Certificate
A digital certificate is an electronic “credit card” or “passport” that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA).
It contains your name, a serial number, expiration dates, a copy of the certificate holder’s public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.
Digital certificates use a cryptographic technology called public-key cryptography to sign software publications and to verify the integrity of the certificate itself. One key encrypts and another key decrypts.
Protocol (ex. http://, https://, etc)
A protocol is a set of invisible computer rules that govern how an internet document gets transmitted to your screen.
These dozens of programmatic rules work in the background in the same way a bank employs staff procedures to keep your money safe.
List of popular protocols:
http Hypertext Transfer Protocol https Hypertext Transfer Protocol Secured TCP/IP Transmission Control Protocol/Internet Protocol ftp File Transfer Protocol IMAP Internet Message Access Protocol POP Post Office Protocol SMTP Simple Mail Transfer Protocol telnet Terminal Network protocol UDP User Datagram Protocol nntp Network News Transfer Protocol MAC Media Access Control protocol DNS Domain Name System protocol DHCP Dynamic Host Configuration Protocol
Property (Properties)
The part(s) of which something is comprised. Attributes, characteristics, or qualities.
For example, a snow cone has a few properties: a paper cup, ice, and syrup.
In science, this relates to specific rules.
For example, pure water has the property of being transparent. This means you can say that all pure water, no matter where you find it, is transparent.
Parameter
A value passed to a program by either a user or another program in order to customize the program for a particular purpose.
A parameter could be anything; for example, a file name, coordinate, range of values, a money amount or code.
Value
(1) The content of a field or variable. It can refer to alphabetic as well as numeric data.
For example, in the expression, state = “PA”, PA is a value.
(2) In spreadsheets, the numeric data within the cell.
Index (all types)
A method for keeping track of data so that it can be accessed quickly. Like an index in a book, it is a list in which each entry contains the name of the item and its location. Computer-based indexes may point to a physical location on a disk or to a logical location that points elsewhere to the actual location.
Indexes are used by all types of software, including the operating system, database management system (DBMS) and applications.
For example, the file system index in an operating system contains an entry for each file name and the starting location of the file on disk. A database index has an entry for each key field (account number, name, etc.) and the location of the record. Search engines use a very sophisticated indexing system to keep track of billions of pages on the Web.
(2) In programming, a method for accessing data in a table.
Indexing (Search)
Once search bots (or “Spiders”) are done crawling a site, the search engine (ex. Google) must store the information in a way that makes it useful.
Indexing has a single purpose: it allows information to be found as quickly as possible. One of the most effective ways of doing this is called “Hashing”.
Web “Crawling” and Spiders
Before a search engine can tell you where a file or document is, it must be found using special software robots, called spiders.
The “spider” builds lists of the words found on websites. When a spider is building its lists, the process is called Web crawling. When the Google spider looked at an HTML page, it took note of two things: The words within the page and Where the words were found
Note: Spiders are always crawling.
Hashing (in terms of search)
A method for storing and retrieving records from a database (DB).
For example: In English, there are some letters that begin many words, while others begin fewer. You’ll find, for example, that the “M” section of the dictionary is much thicker than the “X” section. This inequity means that finding a word beginning with a very “popular” letter could take much longer than finding a word that begins with a less popular one. Hashing evens out the difference.
Boolean Operators
To search through an index, a user must first build a query. A query could be a single word. However, for more complex searches, one could use Boolean operators, such as AND, OR, NOT, “”, and so on.
Symbolic logic developed by George Boole
Array
An array is an orderly (systematic) arrangement, often in rows, columns or a matrix.
For example, a box of chocolates or a crate of oranges that have an arrangment of 12 across and 8 down (8 across, 5 down, 12 across 12 down etc.)
API
API, which stands for application-programming interface, is a protocol which allows one piece of code to communicate with another piece of code (usually between a developer and a third-party). It’s like a VIP pass to a club with all the people you want to sell your stuff to.
For example, HootSuite and Tweetdeck use Twitter’s API to build powerful applications. Twitter, of course, loves this b/c it gets more people to adopt the service.
This, of course, has its downsides. The API owner (Twitter, in this case) could make changes to its API or go down, which would likely disrupt service for HootSuite customers.
SaaS
SaaS (Software as a service) describes when users “rent” or “borrow” online software instead of actually owning it.
For example, instead of selling you a copy of Microsoft Word for $300, a cloud computing model would “rent” word processing software to you through the Internet for perhaps 5 dollars a month.
Note: Company’s using this model are effectively holding customers’ data “hostage’ and should focus even more on privacy and security.