Tech Force
  • Home
  • I.T. Support
  • Managed Services
  • Cloud Solutions
  • Blog
  • Contact Us

Tech Bits & Bytes Blog

Internet Lingo 101: Cheat Sheet for Beginners

4/23/2017

Comments

 
Picture
The Internet is growing and evolving so fast even the dictionary has trouble keeping up. Here are 12 suddenly common terms that are helpful to know.
 
Browser
A browser is a free piece of software that lets you view web pages, videos and other online content. It’s a core requirement of going online, as it converts the computer languages HTML, Javascript and XML into human-readable form.

The most popular browsers in 2017 are Google Chrome, Safari, Firefox and Microsoft Edge*. (*Internet Explorer has been superseded and is no longer recommended due to security concerns)
 
Email
Electronic Mail (formerly spelled with a hyphen: ‘e-mail’) is typed messages sent from one person/business to another via the Internet. It’s delivered almost instantly and then waits patiently for the recipient to open and read it.

You’ll need a webmail service (e.g. Gmail) or installed software (e.g. Outlook) to read, write and send, but you can also set your smartphone up for this. Most emails are in the form of letters, newsletters or catalogs, often with a more casual tone. Email can include text, links to the internet and images, but not video/sound.
 
Encryption
Before important data is sent over the internet, it’s scrambled to turn it into gibberish that means nothing to anybody who might intercept it. Unless there’s been a massive security breach, only the sender and intended recipient will have the decryption key to turn it back into readable data.

You don’t have to encrypt your own data as it happens automatically. Your email provider and important places like banks and online stores have digital security systems that take care of the encryption/decryption for you.
 
Firewall
A firewall is a security measure designed to act like a door bouncer to your network.  When an unauthorized user attempts to gain entry, the firewall blocks their path until it’s checked them out thoroughly. If there’s anything suspicious, the firewall refuses to let them in.
 
HTTP and HTTPS
These are acronyms for the rules of how data is transmitted to your computer screen. The actual mechanics are incredibly complicated, but the terms have one very important distinction:
  • HyperText Transfer Protocol (HTTP) means the images, text and links should appear in your browser.
  • HyperText Transfer Protocol Secured (HTTPS) means the page has an added layer of security to hide your personal information from hackers. Data sent through pages with this prefix is securely encrypted before transmission.
 
IP Address
Every device that accesses the Internet is assigned a unique IP address to identify itself. It’s used to make sure when you request a page or document, it’s sent to you – and not someone in Alaska. Your IP will look something like ‘202.9.64.55’ and may be referred to as fixed or dynamic.
 
ISP
Your Internet Service Provider (ISP) is the company that allows you to connect to the Internet.  They’ll also offer extra services like email or web hosting. It’s impossible to bypass the ISP level and connect directly to the Internet.
 
Malware
A broad term to describe viruses and malicious software from hackers. Malware can manipulate you into paying money, take control of your computer, steal your private details or break your computer in some way. Instead of listing each specific threat, you’ll commonly see them lumped together under ‘malware’.
 
Router
The traffic system for your network, connecting computers and devices within the home and acting as a defensive gateway to the Internet. These hardware devices can be wired or wireless, and allow you to share one Internet connection amongst all the computers/devices in your home.
 
Social Media
A broad term to describe all the websites and applications that let you share and interact with others online. To fit this umbrella, the site needs to allow user profiles, live updates and the ability to add friends/followers.  The most common social media applications are Facebook and Twitter.
 
Spam and Filtering
Any unsolicited messages sent over the Internet, usually in bulk, are called spam. Usually, it’s electronic junk mail, but it’s also a technique hackers use to trick people into clicking links to their malware.

Email applications are reasonably good at identifying spam and should shift it automatically to a spam folder before you see it. Occasionally, the filters get it wrong and you may find a relevant email needs to be dragged back to your inbox.
 
URL
Each website has a unique address on the web known as a URL (Uniform Resource Locator). URLs commonly end in .com but can also end in a country specific extension like .com.au or .fr, or more recently, in new and exciting extensions such as .xyz or .me
Comments

    Tech Force Blog

    We provide you with  important, practical tips and insight for your technology and networks for both home and business.

      Contact Us for Help!

    Submit Request

    Archives

    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    July 2017
    April 2017
    February 2017
    January 2017
    December 2016
    November 2016

    Categories

    All
    Business Continuity
    Business IT
    Cloud Computing
    Cyber Security
    Networking
    Tech Talk

    RSS Feed

Get in touch with us!

p.   (262) 515-9499
e.   support@techforceonline.com

Office Hours:
Monday - Friday:  9am - 5pm

Contact Us Today!
Remote Support
Residential Online Backup

Picture

See what our clients have to say...

Very pleased with Tech Force!  We've been using Tech Force for over four years now.  We've had a lot of different people do computer and IT stuff for us, but Tech Force is the first to come in and implement a plan.  The plan was executed and we've had no problems.

Tech Force is very good at getting back to you when you have a problem. You don't have to wait and wait for things to get done. If they can't take care of the problem remotely, they will come over here. They always send somebody who is skilled and knows how to take care of the problem, unlike the companies we've used in the past. We've been very pleased with Tech Force!  ~ Ed V., Advanced Spine & Sport

More Client Reviews

Read Our Customer Reviews


We service Racine, Mount Pleasant, Sturtevant, Wind Point, Union Grove, Elmwood Park, Franksville, Caledonia, Kenosha, Somers, Pleasant Prairie, Bristol, Parkside, Oak Creek and Franklin, WI and surrounding areas. Copyright © 2009-2020 Tech Force Computer Service, LLC.
  • Home
  • I.T. Support
  • Managed Services
  • Cloud Solutions
  • Blog
  • Contact Us