130 likes | 131 Views
The rapid growth of the World Wide Web and the increased use of web-based services make it essential for the users of such services to be aware of the most important and frequently used terms with regard to web-based services.<br>
E N D
Table of Contents • Cross-platform Software, Cascading Style Sheets (CSS) • Database, Data center, Data Loss Prevention • DHCP, DNS, Domain, Domain Name, Disaster Recovery • Edge Computing, Encryption, Endpoint Security, Ethernet • Access point, Alias, Authentication • Application Programming Interface (API), APT Threats • Bandwidth, Blockchain, Break/Fix, BYOD • Cache, Cloud • Cookies, Content Management System
Access point, Alias, Authentication • Access point: An access point refers to a device which enables the communication of wireless-equipped computers and other devices with a wired network. • Alias: An alias, which is also referred to as a “nickname”, is usually used in e-mail applications. It is an easy to remember name that is meant to be used for a more complicated and lengthier name. • Authentication: Authentication is the process that caters to verification of the identity of a user or a process. In it, a set of credentials serve the purpose of identification by being associated with an incoming request.
Application Programming Interface (API), APT Threats • Application Programming Interface (API): An application programming interface refers to a computing interface which specifies interactions among multiple intermediaries of software. It can be designed as per some industry-standard or it can be specific to a component or custom. Modular programming is enabled by an API. This lets users use an application programming interface independently of the implementation • APT: APT refers to an advanced persistent threat. It usually refers to a state-sponsored group which presents a threat by enabling unauthorized access to a network and by successfully remaining undetected for a long duration.
Bandwidth, Blockchain, Break/Fix, BYOD • Bandwidth: Bandwidth refers to the amount of data which is capable of being transmitted over a network at any particular time. If a network’s bandwidth is high then it implies that the volume of data that can be transmitted is high. It is usually measured in bps (bits per second). • Blockchain: A blockchain refers to a specific type of database which stores data in blocks which are chained. In it, every block has a cryptographic hash of the timestamp and transaction data of the previous block. Its design renders it resistant to alterations in data. • Break/Fix: Break/fix is an IT service model through which IT services that are provided are billed on an as-needed basis. In it the client is billed only for the work done and doesn’t have to pay any fixed fee for the ongoing service. • BYOD: BYOD refers to “Bring Your Own Device” and is a policy related to business and technology which lets employees use their personal mobile devices for accessing company data.
1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?
Cache, Cloud • Cache: A cache refers to a set of files that are saved on one’s hard disk and aid one’s browser with regard to displaying those pages more quickly that have been visited previously. • Cloud: A cloud makes it possible to have computer system resources’ on-demand availability. Clouds can be restricted to the use of a single company. In this case these are referred to as enterprise clouds. Clouds can be available for the use of multiple companies, wherein these are known as public clouds. Clouds refer to servers that can be accessed over the Internet along with the databases and the software that run on such servers. A cloud enables its users to access applications and files from any device at any time. To digress, clouds are used in cloud hosting. Cloud hosting is a type of web hosting service which makes it possible to access websites over the Internet. This service is provided by web hosting companies and the most popular web hosting companies are usually referred to as the “Best Cloud Hosting Company”, the “Best Website Hosting Company”, the “Best Windows Hosting Company” etc.
Cookies, Content Management System • Cookies: Cookies refer to text files that have data that serve to identify one’s computer when one is using a computer network. Cookies get created when one uses one’s browser to visit a site which uses cookies to track visitors’ movement within the website. Moreover, cookies aid in resuming a visitor’s browsing on that site, storing his/her login details, preferences as well as customization functions. • Content Management System: CMS is the abbreviation for Content Management System. It is essentially a software through which users can create, manage as well as modify a website’s content easily without being dependent on any technical know-how. It is a tool for building websites that eliminates the dependency on writing codes for this purpose. It is software platform which enables the creation of web content and its editing, archiving, reporting, publishing, distribution etc.
Cross-platform Software, Cascading Style Sheets (CSS) • Cross-platform Software: A cross-platform software refers to a computer software which has been implemented on many computing platforms. Such a software can be of two types. One of these needs individual compilation for every platform that it supports. The other type is capable of being run directly on any platform without the need for any special preparation. • Cascading Style Sheets (CSS): A CSS is used to style web documents. Cascading Style Sheets is a style sheet language which specifies the presentation of a document that is written in a markup language. It enables the separation of content and presentation.
Database, Data Center, Data Loss Prevention • Database: A database refers to data that exist in an organized collection. It is usually stored and accessed electronically. A database renders data management easy. • Data Center: A data center refers to a physical facility which is used by businesses for housing their critical data and applications. A data center delivers shared data and applications through a network of resources that are related to computing and storage. • Data Loss Prevention (DLP): DLP is the abbreviation for Data Loss Prevention and refers to a collection of processes along with the tools that are meant to prevent the loss of data, unauthorized access to data and the misuse of data. DLP tools monitor as well as control endpoint activities. It is meant to protect data that is in motion while in network traffic or in use which include endpoint actions or at rest during data storage.
DHCP, DNS, Domain Name, Disaster Recovery • DHCP: DHCP is the abbreviation for Dynamic Host Configuration Protocol. It is a protocol for network management through which a server that is on a local network is able to assign temporary IP addresses to network devices, such as computers. • DNS: DNS is the abbreviation for Domain Name System, which refers to a hierarchical naming system for resources that use the Internet or a private network. A DNS uses a decentralized naming system. It converts domain names to their corresponding numerical IP addresses. It serves the function of locating as well as identifying devices and services with the underlying network protocols. It assigns domain names and maps those to respective Internet resources. This is attained through the allocation of authoritative name servers for every domain. Moreover, it specifies the DNS protocol. • Domain Name: A domain name is a website’s address which is typed in the browser URL bar for accessing the website. • Disaster Recovery: Disaster recovery, as an area of security planning, includes policies, procedures and tools that aid in the recovery and proper continuation of essential technology infrastructure post an untoward incident, such as a natural or man-made disaster.
Edge Computing, Encryption, Endpoint Security, Ethernet • Edge Computing: As a distributed computing paradigm, edge computing, serves to bring data storage as well as computation closer to the location where it is required. This not only aids in improving response time but also saves bandwidth. • Encryption: Encryption refers to the process of encoding information. The process of encryption renders readable text into an undecipherable form that can be decrypted via a decryption key. It ensures data security which is crucial for sensitive information. In encryption, the original representation of any information (plaintext) is converted into another form (ciphertext). A ciphertext can be converted into plaintext by authorized parties in order to access the original form of the information. • Endpoint Security: Endpoint security ensures the protection of networks, which are bridged to clients’ devices remotely. Endpoints on a network or in a cloud are protected against cyberattacks through systems that have to do with endpoint security. • Ethernet: Ethernet refers to a type of communication protocol which connects computers that exist within a LAN (Local Area Network) or a WAN (Wide Area Network).
Thanks! ANY QUESTIONS? www.htshosting.org