The Internet has grown and developed so quickly; even Webster’s dictionary has difficulty staying up to date with Internet Jargon. If tech-savvy is not a term used to describe you or raised on Google and YouTube, then the terminology used can be like a foreign language.
I was looking to put some content together for a new post and thought about a recent discussion I had with an “old-timer.” Now this very seasoned person has probably experienced more in their lifetime than I could ever imagine, and I have been around the world.
Born during the great depression, they have gone from a time where riding a horse into town to use an unreliable land-line phone was the “can you hear me now” commercial for real. So, this salty gal tells me about the challenge of keeping up and understanding all “this modern technology.” We sat down, and I explained a few things to her. Not sure she still understands everything, but she did appreciate the lesson on the Internet jargon.
12 Internet Jargon Terms
With all the above said, the following are twelve standard terms or Internet jargon that will be useful for anyone to know.
The Internet Service Provider (ISP) is a company that enables you to connect to the Internet. They will also provide additional services such as email or web-hosting services. It is impossible to circumvent an ISP to establish an internet connection directly.
Transport system for a network. It links computers and other gadgets inside the home, as well as functioning as a protective door to the Internet. These hardware devices may be wireless or wired and enable you to share a single internet connection with every computer and equipment in your home.
The firewall, a security precaution, intended to function as a bouncer at the virtual door on your network. Once an unauthorized person tries to enter, the firewall begins blocking their way until it checks them over thoroughly. If there is something suspect, your firewall rejects them.
Each device that accesses the Internet gets allocated a unique IP address to identify itself. The IP address ensures when you ask for a page or document sent to you – and not somebody in China. Your IP will look like ‘220.127.116.11’ will either be dynamic or fixed. Think of an IP address like a mailing address to your home.
Most popular in the browsers are Google Chrome, Firefox, Safari, Opera, and Microsoft Edge*.
(*Internet Explorer has been superseded and no longer recommended due to security concerns)
Every website possesses a unique address on the world wide web referred to as a URL (Uniform Resource Locator). URLs generally end in ‘.com’, but it can also end with a country-specific extension like ‘.au’ or ‘.fr’. More recently, in new and exciting extensions such as ‘.me’ or ‘.io’.
HTTP AND HTTPS
These abbreviations stand for the rules for sending data to your computer monitor. The real process seems exceptionally complicated. However, these terms have one crucial difference:
Hypertext Transfer Protocol (HTTP) refers to the way text, images, and links images, text, and links should be displayed in your web browser.
Hypertext Transfer Protocol Secure (HTTPS) indicates the website has an additional level of security to conceal your private information from hackers. Data transmitted through the pages together with this prefix becomes safely encrypted before transmission.
Electronic Mail (formerly spelled: ’email’), in the form of a message, sent from an individual or business to another individual or company over the Internet delivered almost immediately and waits patiently for the receiver to open and then view it.
You will require a web-based email service (e.g., Gmail, Yahoo, or O365 Outlook) or installed software (e.g., Outlook) so you can read, create, and send. But you may also be set up your smartphone for this. Generally, email messages are in the form of letters, bulletins, or catalogs, frequently with a more informal tone. Email can contain text, hyperlinks to the web, and pictures, although not video or sound.
SPAM AND FILTERING
Every unsolicited message sent across the Internet, generally sent in bulk, known as spam. Frequently, this form of electronic junk mail can be a method that hackers utilize to fool folks into clicking links to malware.
Email applications work relatively good at detecting spam and, most times move it automatically to a junk mail or spam folder before you even get a chance to see it. Sometimes, the spam filters make a mistake, and you might find a pertinent email that needs pulling back to the inbox.
Before transmitting vital information over the Internet, it became mixed up and turned into nonsense. It will mean nothing to anyone who could intercept it, except in cases where there has been a massive security breach, just the writer and the planned receiver will have a decryption key to turning it back into a readable form.
You do not have to encrypt the data as this occurs automatically. Your email service provider and large organizations like the banks and online retailers take care of the encryption and decryption on your behalf because they possess the digital security systems to do so.
A broad word used to refer to viruses and malicious programs from hackers. Malware can manipulate you to pay money, take over your computer, steal your personal information, or bust the machine in one way or another. Sometimes all of those, as mentioned above, can happen. Rather than listing every threat, you will usually see them grouped as ‘malware.’
Another broad term used to describe all websites and apps that allow you to share and interact with other people on the web. The web site needs to permit user profiles, live updates, as well as the ability to add friends and followers. The most popular social media apps are Facebook and Twitter.
CONCLUSION OF INTERNET JARGON
Do you have different suggestions and comments related to the Internet jargon? If so, I kindly request that you share them. You may leave your comments, ideas, and queries below, or Contact Us.
Would you like to start receiving articles like this and other information related to ITSM, IT Policy, IT Consulting, and IT service management information today? – START HERE!