The most important expressions and terms in the world of the Internet
Without doubt, the Internet or the World Wide Web is one of the greatest inventions and discoveries of humanity. This technology has facilitated many of the things that were previously considered impossible, the most important of which is receiving knowledge and obtaining information.
It is in short a wide connection of computer networks consisting of millions of desktops, smartphones, and gaming devices video and smart devices all can connect to the Internet with no organization or entity that fully controls this network.
For all that, understanding the basic terms of this technology is not a luxury, it is an essential part of dealing with this vast world, and here together, we will familiarize ourselves with the most famous and complex terms that one day must have passed when you are browsing the various Internet sites.
The basic tool or program for anyone who wants to surf the web, without which the Internet access process will be impossible, a program that is installed on computers and mobile devices in advance at some computer operating systems, with other independent browsers that can be downloaded from the Internet.
Browsers are a free software package, or applications for mobile phones that allow you to view Web pages, graphics, and most content across Internet, the most popular web browsers include Google Chrome, Firefox, Internet Explorer and Safari, but there are many other popular browsers Low.
Web page :
A Web page is what you see in your browser when you are connected to the Internet, you can think of a webpage as a page in a paper magazine, you will see the texts and images, graphs, links, ads and more on any page you view, which is exactly the principle of online browsing.
Often, you click or click a specific area of a Web page to expand the information or go to a related Web page, clicking on a link – an excerpt from text that shows a different balloon than the rest of the text – to move you to a different Web page, if you want to return, you can use the arrows in Top of the browser.
It is a shortcut to the phrase “uniform Resource locator URLs” and means web browser addresses for Web pages and files, using a URL you can locate and review specific pages and files via a Web browser.
You can find a URL everywhere, such as at the bottom of your business cards, or on TV screens during ad breaks, or written in documents you read on the Web, or picked up by one of the search engines online.
- The URL formula is like:Http://www.examplewebsite.com/mypageIt can be shortened like this:
Sometimes it is longer and more complex, but it follows all the recognized rules for naming URLs.
The URLs consist of three main parts for processing a page or file on the Internet:
* IP “internet protocol”: The part that ends with a sign://Most Web pages use HTTP or HTTPS protocol, with some other protocols.
* Domain host scope: which often ends with. com, .net,. edu, or. Org
* The filename or page name itself webpage.
Domain name is a unique part of an alphabetical URL, your site’s domain name can be officially registered with a domain registrar by a person, business or non-profit organization, and the domain name consists of two parts:
Actual word or alphabet; for example “Arageek”
A top-level domain name that specifies which type of site is, for example, “. com for Domains”, “. org for Organizations”, “. edu for educational institutions”.
It is a secure Sockets Layer Security socket shortcut, which is a secure encryption protocol or layers used to make data secure when you transfer it over the Internet.
SSL is particularly used on shopping sites to keep financial data secure, but it is also used on any site that requires sensitive data “passwords”.
You can make sure that the site in question uses this layer of encryption to look at the URL and see HTTPS before the site address.
Proxy Server :
Proxy server is a Web server that acts as a shield for web users, and hides related information such as (Network address, website, etc.) from Web sites and other users, in the context of the Internet, proxy servers are used to help anonymous browsing, where the proxy server is working as a buffer between The researcher and the intended website, allowing users to view the information without tracking it. A proxy server can be maintained through Linux Dedicated Hosting servers, which are acquired on a monthly-pay basis.
Firewall is a security action designed to keep computers, users, and unauthorized networks from accessing data on another computer or another network, firewalls are especially important for web users; they can protect the user from malicious spyware and hackers while Connect to the Internet.
Tcp / ip :
Transmission Control Protocol (TCP), Internet Protocol (IP), two standard computer network protocols, and the Protocol is an agreed set of procedures and rules, when two computers are connected to the same protocols – the same Set of rules – they can understand each other and exchange data. However, TCP and IP are commonly used together, although TCP/IP has become a standard term to refer to the set of protocols used to connect to the Internet.
Temporary Internet Files :
Very important in the context of Web Search, every Web page the user visits stored data (pages, video files, audio, etc.) in a particular file folder on his or her computer’s hard drive, this data is stored so that the next time he visits Where the user has this web page, will be loaded quickly and efficiently because many of the data has already been uploaded via temporary Internet files instead of the website server.
Temporary Internet files can eventually take up too much memory space on your computer. Therefore, it is important to scan each period.
HTTP and HTTPS:
HTTP is the abbreviation of Hypertext Transfer Protocol, the standard for communication and data transmission over web pages. When a web page contains this prefix, links, text, and images must work correctly in the web browser.
HTTPS is the abbreviation of “Hypertext Transfer Protocol Secure” and indicates that a web page has a special layer of encryption added to hide your personal information and passwords from others.
When you sign in to your online bank account or the shopping location where you enter your credit card information, look for “HTTPS” in the URL bar, which means that the site is secure and you can trust it.
This term indicates that you do not have an Internet connection, meaning that nothing connects you to other devices on the network, and does not load pages and sites to read and browse. Some sites and applications allow you to work offline. When you finish your work and when you reconnect online, automatically on the Internet.
What is the Hyperlink hyperlink?
Known as the basic building block of the World Wide Web, is a link from a single document, image, word, or web that connects sites to each other on the Internet, allows us to surf sites and read information on the Internet quickly and easily.
They can be abbreviated as the structure on which the web was built.
Web hosting :
Web host is a business activity/company that provides space, storage and connectivity to enable Internet users to watch Web sites, hosting websites usually refer to business hosting space for active Web sites, a service that provides space on a Web server, as well as a direct Internet connection, so the site can Seen and interacted with them by anyone who has an Internet connection.
There are different types of web hosting, from a basic site of a single page that only needs a bit of space, to the category of customers who need full data centers for their services.
Many web hosting companies provide a dashboard for clients that allow them to control different aspects of their web hosting services This includes FTP, the installation of various content management system Cmsi, and the SPE Service pack extensions.
Encryption and authentication :
Encryption is a mathematical mixing of data so that it is hidden from users, encryption uses complex math formulas to converts private data to meaningless text or icons, and you can only decode them using customized programs.
Encryption is the basis for how to use the Internet as a line of defense to perform reliable business, such as online banking, and to purchase credit cards over the Internet. Browse this site to learn more.
Authentication is directly related to encryption, authentication is the complex way in which computer systems verify that you are a natural person and not a robot.
Cloud computing :
Cloud computing began as a term to describe existing programs on the Internet, instead of buying and installing them on your computer, mail Web-based electronic is an example of cloud computing, each user’s email is stored and accessed in an interlace cloud of Anywhere.
HTML, XML, and XHTML :
HTML is the acronym Hypertext Markup Language, a language that is used to program Web pages, and is a browser’s own commands your web to display text and graphics in a certain way, regular Internet users do not need to know HTML encryption to enjoy Web pages provided by the scripting language for browsers.
XML is an Extensible Markup Language (extensible. HTML), which is a cousin of the code, and focuses on indexing and classifying text content for a Web page.
XHTML is a combination of HTML and XML
What is IP Address ?
The computer and each Internet-connected device use a unique, non-recurring Internet Protocol address for identification, in most cases, assigning Internet addresses automatically, Internet users typically do not need to assign an Internet address, the Internet address can appear as follows: 220.127.116.11
Or like this :
21da: D3:0: 2f3b: 2AA: FF: Fe28:9C5A
An Internet address is assigned to each computer or mobile phone connected to the Internet for tracing purposes, the Internet address may be permanently mapped, or the Internet address may sometimes change, but it is always unique.
Wherever you surf the Internet, or you send an e-mail message or an instant message, or upload a file, your Internet address is equivalent to the auto license plate for accountability or tracking.
What is an ISP ?
Internet service provider is an essential means of accessing the Internet, you can access your ISP free of charge at school, library, or work, or you may pay a special fee to connect to the Internet from home, your ISP is the company or governmental organization that provides the connection service Internet in your city or country.
Your ISP offers a variety of services for a variety of prices: access to a Web page, e-mail, web hosting, downloading content… etc., most ISPs provide different internet connection speeds for a monthly fee, you can choose to pay more to connect to high-speed Internet if you want to watch movies, or select a cheaper package if you use the Internet mostly to browse and send email.
What is router?
A router is a device that acts as a traffic policeman for network signals that reach your home or your business from an ISP, the router can be wired or wireless or both.
The router provides a defense against hackers and directs content to a specific computer, broadcast device, or printer that receives its signals, often a service provider Internet your ISP provides your internet router, when you do this, you must adjust the router settings Appropriate, if you choose to use a different router, you may need to enter your information from scratch.
What is email?
The way that you can send and receive written messages from one screen to another, e-mail is usually handled through Gmail, Yahoo Mail, Hotmail, or a software package installed such as Microsoft Outlook or Apple mail.
Internet users typically start creating a single e-mail address for their families and friends. However, you cannot stop on one address or e-mail service; you can choose to add other e-mail addresses for online shopping, business activities, or social networks.
What is email spam and filtering?
Spam: is the name of the term of junk emails, and it comes in two main categories: Many ads are annoying, and messages are trying to lure you into revealing your passwords and personal information, which is dangerous.
Filtering: filter serves as a traditional defense for your email, but not spam like spam, and we find that filter property has been merged in many e-mail servers, filtering uses a program that reads your incoming e-mail and then synthesizes the keywords, It then deletes or isolates messages that appear to be unwanted messages.
To find such filtered messages look for them in the spam section or the Junk Mail Junk folder.
What is malware?
is a general term to describe any malicious software designed by hackers, including viruses viruses, Trojan horses, Trojans, key bloggers, and any other programs seeking to do one four things:
*Sabotage your computer in one way or another.
*Steal your information.
*Remote control in your computer.
*Manipulating you to buy something.
It is the use of compelling emails and web pages to entice you to write your account numbers, passwords and personal identification numbers, often come in the form of fake warning messages, or fake logon screens.
The download is a broad term that describes the transfer of something you find on the Internet or the World Wide Web to your computer or any other device, usually associated with downloading songs and music and program files, the more file you copy, the more time you take the download to move it to your computer, some The downloads take seconds, and some take longer minutes depending on your internet speed.
It is a completely reverse download, here you are raising a file from your computer to the Internet, whether you want to keep it in the cloud or send it to someone.
It is called online sales and purchase transactions, meaning that only physical money is traded, and bank account information is traded to complete this type of trade, delivering the products you buy to your doorstep, or sending the products you sell to the person who bought it, whether you are a company or an individual.
It can be interpreted as personal online space for anyone who writes opinions or addresses different topics over the Internet, such as football interests, their opinions about politics, their comments on technical events, comic books or technical tips on using a computer program.
It is that person who writes topics in blogs that have been created on the Internet and can be the author of a blog where he writes his opinions, or writes in some other blogging either as a guest, contributor or full-time.
Social media Community:
A broad term for any online tool that enables users to interact with thousands of other users, Facebook and Twitter are among the largest sites social networking, LinkedIn “that LinkedIn is a social and professional site” at the same time, in addition to other popular sites such as: YouTube, Google Plus, and instagram, Pinterest, Snabchat, MPlayer, tumbler and Reddit.
In the context of the Web, the password is a combination of letters and numbers/or special characters combined in a single word or phrase, designed to authenticate the entry of a single user or record it on a Web site, the most useful passwords are those that are not easily guessed.
With the expansion of the Internet every day, the emergence of new terminology is expected. So, if you want to explain a term or have a term that you want to share, feel free to type it in the comments box.