SlideShare una empresa de Scribd logo
1 de 42
The human brain …

… tricks us whenever it can!
The phenomenal power of the human mind
I cdnuolt blveiee that I cluod aulacity uesdnatnrd what
I was rdanieg The phaonmneal pweor of the hmuan
mnid! Aoccdrnig to a rscheearch at Cmabrigde
Uinervtisy, it deosn’t mttaer inwaht oredr the ltteers in
a wrod are, the olny iprmoatnt tihng is that the frist
and lsat ltteer be in the rghit pclae. The rset can be a
taotl mses and you can still raed it wouthit a porbelm.
This is bcuseae the huamn mnid deos not raed ervey
lteter by istlef, but the word as a wlohe. Amzanig huh?
And I awlyas thought slpeling was ipmorantt.
“Fix me I’m Scrambled”
Mechanics:
1. Each group will be given 6 scrambled words.
2. You are given 10 minutes to fixed those letters
and give your idea on what the word means.
3. You can write your answer on the paper.
4. Each scrambled letters is worth 2 points.
5. Lastly, we will deduct a point for the noisiest
group.
Internet Terms and Definitions
Address

It is a series of letters and numbers that
identify a location.
Address
Cyberspace
 Refers to all computer networks on the
internet.
Homepage
 The web page that your browser is set to use
when it starts up, or the main page of any
website.
Filtering Software
 Different methods to screen unwanted
internet contents including
Whitelisting
Blacklisting
Monitoring Activity
Keyword recognition
Navigate
 The act of moving from page to page and
website to website online.

Piracy
 illegally copying copyrighted software, music
or movies.
Spam (electronic junk mail)
 It is an unwanted email from someone we
don’t know.
Virus
 A computer program that can destroy files or
make you computer “crash”.
Website
 A collection of “pages” or files linked together
and available on the world Wide Web.
Attachment
 This is a file that has been added to an e-mail.

Attach files
Chat
 A real-time communication over the internet.
Hardcopy
 This is the printed/paper copy of a file from the
computer.
Blocking Software
 A computer programs that block access to
websites or other services available over the
internet.
Cyber bullying
 Sending or posting harmful or cruel text or
images using the internet or other digital
communication devices.
Icons
 Small pictures that represent the program on
your computer.

Icons
Online
 Another way to describe having access to the
internet or actively using the internet.
Post
 To leave a message on a newsgroup or bulletin
board.

Query
 A request for information about certain topic.
 It is what you put in the box when you type
something into the search engine.
Blog (Web Log)
 Usually defines as a personal or noncommercial
web site that uses a dated log format.
Emoticons
 An animated faces that express different emotions.
Internet
 A network of millions of computers from all over
the world.
Outbox
 This is where all of the messages that you send
are kept.
Server
 A special software package that connects to a
network and provides data.
Surf
 To search for information on the web in a random
, non-linear way.
Bookmark
 A way to quickly access a favorite web site by
saving it in your browser.
Hacker
 A popular term for someone who accesses
computer information either legally or
illegally.
Internet Service Provider (ISP)
 A company that provides internet access to
customers.
Globe Telecom
Smart
Sun
Bayan Telecommunications Holdings Corporation
Offline
 Refers to not being connected to the internet.
Webmaster
 A person responsible for administering a web
site.
World Wide Web
 An infinite number of games, web sites and other
things all connected to each other through a links
on the internet.
Browser
 A program that allows users to view web
pages.
Top 5 Browser:
Chrome: 42.63%
IE: 25.54%
Firefox: 19.97%
Safari: 8.4%
Opera: 1.03%
Hardcopy
 This is the printed / paper copy of a file from
your computer.
Intranet
 A private network inside a company or an
organization
Social Networking sites
 It is web site specifically focused on the
building and verifying of social network for
whatever purpose.
Best social networking sites:
Spamming
 A mass mailing sent as Instant Messages to
users.
Hypertext Markup language (HTML)
 The coded format language used for creating
documents on the world wide web and
controlling how web pages appear.
Chat room
 An interactive forum where you can talk in
real-time.
Cookie
 also known as an HTTP cookie, web cookie,
or browser cookie
 A small file downloaded by some web sites to
store a packet of information on your browser.
History
 A list of websites the people are using a
particular computer have visited.
Netiquette
 Proper use of internet.
Plug-in
 A program that extends the capabilities of
your computer.
Softcopy
 An electronic version of a file on your
computer.
Domain Name
 A name given to the numerical or internet
protocol (IP) address of a web site.
Firewall
 This is a system that creates a special “wall”
used by network servers to separate their
intranet from internet.
Hypertext Transfer Protocol (HTTP)
 The standard method computers use to
communicate via the world wide web.
Modem
 A hardware device that allows computer to
communicate with each other by transmitting
signals over telephone lines enabling what is
called “dial-up access”.
Pharming
 An online scam that attacks the browser’s
address bar.
Phishing
 An online scam that uses e-mail to “fish” for
users’ private information by imitating
legitimate companies.
Streaming (media)
 The exchange of video clips, sounds or other
types of media over the internet.

Transmission Control Protocol/ internet Protocol
(TCP/IP)
 The protocol or conventions that computers
use to communicate over the internet.
Uniform Resource Locator (URL)
 The specific location or address of material on
the internet.
Zip File
 Large files that have been compressed to
make them easier to send over the internet.
Assignment: ¼ sheet of paper.

1. What is Internet Protocol?
Internet Terms and Definitions
Internet Terms and Definitions

Más contenido relacionado

La actualidad más candente

what is computer
what is computerwhat is computer
what is computerJelz JZ
 
Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programmingNSU-Biliran Campus
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics Vicente Antofina
 
Keyboard shortcuts
Keyboard shortcutsKeyboard shortcuts
Keyboard shortcutsAnitha Rao
 
Types of software
Types of softwareTypes of software
Types of softwarelatifah2001
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Workssumit kumar
 
Types of application software
Types of application softwareTypes of application software
Types of application softwareJesus Obenita Jr.
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationAna Tan
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer conceptsjhayish
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
Basic computer
Basic computerBasic computer
Basic computergoogle
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types vimal kumar arora
 
Primary Storage Devices
Primary Storage DevicesPrimary Storage Devices
Primary Storage DevicesRaul Correa
 

La actualidad más candente (20)

Storage devices
Storage devicesStorage devices
Storage devices
 
Application Software
Application Software Application Software
Application Software
 
what is computer
what is computerwhat is computer
what is computer
 
Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
 
Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
 
Word processing
Word processing  Word processing
Word processing
 
Application software
Application softwareApplication software
Application software
 
Keyboard shortcuts
Keyboard shortcutsKeyboard shortcuts
Keyboard shortcuts
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Types of software
Types of softwareTypes of software
Types of software
 
Parts of a Computer ppt
Parts of a Computer pptParts of a Computer ppt
Parts of a Computer ppt
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Types of application software
Types of application softwareTypes of application software
Types of application software
 
Introduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts PresentationIntroduction to Basic Computer Concepts Presentation
Introduction to Basic Computer Concepts Presentation
 
Basic computer concepts
Basic computer conceptsBasic computer concepts
Basic computer concepts
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Basic computer
Basic computerBasic computer
Basic computer
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Primary Storage Devices
Primary Storage DevicesPrimary Storage Devices
Primary Storage Devices
 

Similar a Internet Terms and Definitions

Terminologies in the Internet
Terminologies in the InternetTerminologies in the Internet
Terminologies in the InternetRossPolicario
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...Sijuna Aetta
 
Acsess and Use Internet To access and use
Acsess and Use Internet To access and  useAcsess and Use Internet To access and  use
Acsess and Use Internet To access and useTsegabrehanZerihun
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 courseAbdirisakIman
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptxmtsedey2013
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossarythinkict
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internetsameera.moparty
 
Dsa Workshop Internet Historfinal
Dsa Workshop Internet HistorfinalDsa Workshop Internet Historfinal
Dsa Workshop Internet Historfinalhelselcm
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatiakulachihansraj
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxssuser1facb81
 
Going Online
Going OnlineGoing Online
Going Onlinecocon5
 

Similar a Internet Terms and Definitions (20)

Terminologies in the Internet
Terminologies in the InternetTerminologies in the Internet
Terminologies in the Internet
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
Acsess and Use Internet To access and use
Acsess and Use Internet To access and  useAcsess and Use Internet To access and  use
Acsess and Use Internet To access and use
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 course
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptx
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Css- 2nd quarter.pptx
Css- 2nd quarter.pptxCss- 2nd quarter.pptx
Css- 2nd quarter.pptx
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Dsa Workshop Internet Historfinal
Dsa Workshop Internet HistorfinalDsa Workshop Internet Historfinal
Dsa Workshop Internet Historfinal
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Going Online
Going OnlineGoing Online
Going Online
 
Going Online
Going OnlineGoing Online
Going Online
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Cit121lec03
Cit121lec03Cit121lec03
Cit121lec03
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 

Más de Roi Fernandez

Más de Roi Fernandez (20)

History of computer
History of computerHistory of computer
History of computer
 
Other european nations
 Other european nations Other european nations
Other european nations
 
Kitchen utensils ppt
Kitchen utensils pptKitchen utensils ppt
Kitchen utensils ppt
 
India
IndiaIndia
India
 
Geographic setting of india
Geographic setting of indiaGeographic setting of india
Geographic setting of india
 
Early Civilizations
Early CivilizationsEarly Civilizations
Early Civilizations
 
Stages of man
Stages of manStages of man
Stages of man
 
The early men 3
The early men 3The early men 3
The early men 3
 
Civilization of smaller states
Civilization of smaller statesCivilization of smaller states
Civilization of smaller states
 
Continents
 Continents Continents
Continents
 
Pehm music unit 1 lesson 3
 Pehm music unit 1 lesson 3 Pehm music unit 1 lesson 3
Pehm music unit 1 lesson 3
 
Alternative peh mreport
Alternative peh mreportAlternative peh mreport
Alternative peh mreport
 
Topaz research
Topaz researchTopaz research
Topaz research
 
Smooth er
Smooth erSmooth er
Smooth er
 
Smooth Endoplasmic Reticulum
 Smooth Endoplasmic Reticulum Smooth Endoplasmic Reticulum
Smooth Endoplasmic Reticulum
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Human Geography
 Human Geography Human Geography
Human Geography
 
Landforms and Waterforms
 Landforms and Waterforms Landforms and Waterforms
Landforms and Waterforms
 
Geographical Quiz
Geographical QuizGeographical Quiz
Geographical Quiz
 
5 themes of geography
 5 themes of geography 5 themes of geography
5 themes of geography
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Internet Terms and Definitions

  • 1. The human brain … … tricks us whenever it can!
  • 2. The phenomenal power of the human mind I cdnuolt blveiee that I cluod aulacity uesdnatnrd what I was rdanieg The phaonmneal pweor of the hmuan mnid! Aoccdrnig to a rscheearch at Cmabrigde Uinervtisy, it deosn’t mttaer inwaht oredr the ltteers in a wrod are, the olny iprmoatnt tihng is that the frist and lsat ltteer be in the rghit pclae. The rset can be a taotl mses and you can still raed it wouthit a porbelm. This is bcuseae the huamn mnid deos not raed ervey lteter by istlef, but the word as a wlohe. Amzanig huh? And I awlyas thought slpeling was ipmorantt.
  • 3. “Fix me I’m Scrambled”
  • 4. Mechanics: 1. Each group will be given 6 scrambled words. 2. You are given 10 minutes to fixed those letters and give your idea on what the word means. 3. You can write your answer on the paper. 4. Each scrambled letters is worth 2 points. 5. Lastly, we will deduct a point for the noisiest group.
  • 5. Internet Terms and Definitions
  • 6. Address  It is a series of letters and numbers that identify a location. Address
  • 7. Cyberspace  Refers to all computer networks on the internet. Homepage  The web page that your browser is set to use when it starts up, or the main page of any website.
  • 8. Filtering Software  Different methods to screen unwanted internet contents including Whitelisting Blacklisting Monitoring Activity Keyword recognition
  • 9. Navigate  The act of moving from page to page and website to website online. Piracy  illegally copying copyrighted software, music or movies.
  • 10. Spam (electronic junk mail)  It is an unwanted email from someone we don’t know. Virus  A computer program that can destroy files or make you computer “crash”.
  • 11. Website  A collection of “pages” or files linked together and available on the world Wide Web. Attachment  This is a file that has been added to an e-mail. Attach files
  • 12. Chat  A real-time communication over the internet. Hardcopy  This is the printed/paper copy of a file from the computer. Blocking Software  A computer programs that block access to websites or other services available over the internet.
  • 13. Cyber bullying  Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
  • 14. Icons  Small pictures that represent the program on your computer. Icons
  • 15. Online  Another way to describe having access to the internet or actively using the internet. Post  To leave a message on a newsgroup or bulletin board. Query  A request for information about certain topic.  It is what you put in the box when you type something into the search engine.
  • 16. Blog (Web Log)  Usually defines as a personal or noncommercial web site that uses a dated log format. Emoticons  An animated faces that express different emotions. Internet  A network of millions of computers from all over the world.
  • 17. Outbox  This is where all of the messages that you send are kept. Server  A special software package that connects to a network and provides data. Surf  To search for information on the web in a random , non-linear way.
  • 18. Bookmark  A way to quickly access a favorite web site by saving it in your browser. Hacker  A popular term for someone who accesses computer information either legally or illegally.
  • 19. Internet Service Provider (ISP)  A company that provides internet access to customers. Globe Telecom Smart Sun Bayan Telecommunications Holdings Corporation
  • 20. Offline  Refers to not being connected to the internet. Webmaster  A person responsible for administering a web site. World Wide Web  An infinite number of games, web sites and other things all connected to each other through a links on the internet.
  • 21. Browser  A program that allows users to view web pages. Top 5 Browser: Chrome: 42.63% IE: 25.54% Firefox: 19.97% Safari: 8.4% Opera: 1.03%
  • 22. Hardcopy  This is the printed / paper copy of a file from your computer. Intranet  A private network inside a company or an organization
  • 23. Social Networking sites  It is web site specifically focused on the building and verifying of social network for whatever purpose. Best social networking sites:
  • 24. Spamming  A mass mailing sent as Instant Messages to users.
  • 25. Hypertext Markup language (HTML)  The coded format language used for creating documents on the world wide web and controlling how web pages appear.
  • 26. Chat room  An interactive forum where you can talk in real-time.
  • 27. Cookie  also known as an HTTP cookie, web cookie, or browser cookie  A small file downloaded by some web sites to store a packet of information on your browser.
  • 28. History  A list of websites the people are using a particular computer have visited.
  • 29. Netiquette  Proper use of internet. Plug-in  A program that extends the capabilities of your computer. Softcopy  An electronic version of a file on your computer.
  • 30. Domain Name  A name given to the numerical or internet protocol (IP) address of a web site.
  • 31. Firewall  This is a system that creates a special “wall” used by network servers to separate their intranet from internet.
  • 32. Hypertext Transfer Protocol (HTTP)  The standard method computers use to communicate via the world wide web.
  • 33. Modem  A hardware device that allows computer to communicate with each other by transmitting signals over telephone lines enabling what is called “dial-up access”.
  • 34. Pharming  An online scam that attacks the browser’s address bar.
  • 35. Phishing  An online scam that uses e-mail to “fish” for users’ private information by imitating legitimate companies.
  • 36. Streaming (media)  The exchange of video clips, sounds or other types of media over the internet. Transmission Control Protocol/ internet Protocol (TCP/IP)  The protocol or conventions that computers use to communicate over the internet.
  • 37. Uniform Resource Locator (URL)  The specific location or address of material on the internet.
  • 38. Zip File  Large files that have been compressed to make them easier to send over the internet.
  • 39.
  • 40. Assignment: ¼ sheet of paper. 1. What is Internet Protocol?