Important Terminology for the Users of Web-based Services - PowerPoint PPT Presentation

About This Presentation
Title:

Important Terminology for the Users of Web-based Services

Description:

The rapid growth of the World Wide Web and the increased use of web-based services make it essential for the users of such services to be aware of the most important and frequently used terms with regard to web-based services. – PowerPoint PPT presentation

Number of Views:30
Slides: 14
Provided by: htshosting
Category: Other

less

Transcript and Presenter's Notes

Title: Important Terminology for the Users of Web-based Services


1
Important Terminology for the Users of Web-based
Services
2
Table of Contents
  • Access point, Alias, Authentication
  • Application Programming Interface (API), APT
    Threats
  • Bandwidth, Blockchain, Break/Fix, BYOD
  • Cache, Cloud
  • Cookies, Content Management System
  • Cross-platform Software, Cascading Style Sheets
    (CSS)
  • Database, Data center, Data Loss Prevention
  • DHCP, DNS, Domain, Domain Name, Disaster Recovery
  • Edge Computing, Encryption, Endpoint Security,
    Ethernet

3
Access point, Alias, Authentication
  • Access point An access point refers to a device
    which enables the communication of
    wireless-equipped computers and other devices
    with a wired network.
  • Alias An alias, which is also referred to as a
    nickname, is usually used in e-mail
    applications. It is an easy to remember name that
    is meant to be used for a more complicated and
    lengthier name.
  • Authentication Authentication is the process
    that caters to verification of the identity of a
    user or a process. In it, a set of credentials
    serve the purpose of identification by being
    associated with an incoming request.

4
Application Programming Interface (API), APT
Threats
  • Application Programming Interface (API) An
    application programming interface refers to a
    computing interface which specifies interactions
    among multiple intermediaries of software. It can
    be designed as per some industry-standard or it
    can be specific to a component or custom. Modular
    programming is enabled by an API. This lets users
    use an application programming interface
    independently of the implementation
  • APT APT refers to an advanced persistent threat.
    It usually refers to a state-sponsored group
    which presents a threat by enabling unauthorized
    access to a network and by successfully remaining
    undetected for a long duration.

5
Bandwidth, Blockchain, Break/Fix, BYOD
  • Bandwidth Bandwidth refers to the amount of data
    which is capable of being transmitted over a
    network at any particular time. If a networks
    bandwidth is high then it implies that the volume
    of data that can be transmitted is high. It is
    usually measured in bps (bits per second).
  • Blockchain A blockchain refers to a specific
    type of database which stores data in blocks
    which are chained. In it, every block has a
    cryptographic hash of the timestamp and
    transaction data of the previous block. Its
    design renders it resistant to alterations in
    data.
  • Break/Fix Break/fix is an IT service model
    through which IT services that are provided are
    billed on an as-needed basis. In it the client is
    billed only for the work done and doesnt have to
    pay any fixed fee for the ongoing service.
  • BYOD BYOD refers to Bring Your Own Device and
    is a policy related to business and technology
    which lets employees use their personal mobile
    devices for accessing company data.

6
1-800-123 -8156
  • Whoa! Thats a big number, arent you
    proud?

7
Cache, Cloud
  • Cache A cache refers to a set of files that are
    saved on ones hard disk and aid ones browser
    with regard to displaying those pages more
    quickly that have been visited previously.
  • Cloud A cloud makes it possible to have computer
    system resources on-demand availability. Clouds
    can be restricted to the use of a single company.
    In this case these are referred to as enterprise
    clouds. Clouds can be available for the use of
    multiple companies, wherein these are known as
    public clouds. Clouds refer to servers that can
    be accessed over the Internet along with the
    databases and the software that run on such
    servers. A cloud enables its users to access
    applications and files from any device at any
    time.
  • To digress, clouds are used in cloud hosting.
    Cloud hosting is a type of web hosting service
    which makes it possible to access websites over
    the Internet. This service is provided by web
    hosting companies and the most popular web
    hosting companies are usually referred to as the
    Best Cloud Hosting Company, the Best Website
    Hosting Company, the Best Windows Hosting
    Company etc.

8
Cookies, Content Management System
  • Cookies Cookies refer to text files that have
    data that serve to identify ones computer when
    one is using a computer network. Cookies get
    created when one uses ones browser to visit a
    site which uses cookies to track visitors
    movement within the website. Moreover, cookies
    aid in resuming a visitors browsing on that
    site, storing his/her login details, preferences
    as well as customization functions.
  • Content Management System CMS is the
    abbreviation for Content Management System. It is
    essentially a software through which users can
    create, manage as well as modify a websites
    content easily without being dependent on any
    technical know-how. It is a tool for building
    websites that eliminates the dependency on
    writing codes for this purpose. It is software
    platform which enables the creation of web
    content and its editing, archiving, reporting,
    publishing, distribution etc.

9
Cross-platform Software, Cascading Style Sheets
(CSS)
  • Cross-platform Software A cross-platform
    software refers to a computer software which has
    been implemented on many computing platforms.
    Such a software can be of two types. One of these
    needs individual compilation for every platform
    that it supports. The other type is capable of
    being run directly on any platform without the
    need for any special preparation.
  • Cascading Style Sheets (CSS) A CSS is used to
    style web documents. Cascading Style Sheets is a
    style sheet language which specifies the
    presentation of a document that is written in a
    markup language. It enables the separation of
    content and presentation.

10
Database, Data Center, Data Loss Prevention
  • Database A database refers to data that exist in
    an organized collection. It is usually stored and
    accessed electronically. A database renders data
    management easy.
  • Data Center A data center refers to a physical
    facility which is used by businesses for housing
    their critical data and applications. A data
    center delivers shared data and applications
    through a network of resources that are related
    to computing and storage.
  • Data Loss Prevention (DLP) DLP is the
    abbreviation for Data Loss Prevention and refers
    to a collection of processes along with the tools
    that are meant to prevent the loss of data,
    unauthorized access to data and the misuse of
    data. DLP tools monitor as well as control
    endpoint activities. It is meant to protect data
    that is in motion while in network traffic or in
    use which include endpoint actions or at rest
    during data storage.

11
DHCP, DNS, Domain Name, Disaster Recovery
  • DHCP DHCP is the abbreviation for Dynamic Host
    Configuration Protocol. It is a protocol for
    network management through which a server that is
    on a local network is able to assign temporary IP
    addresses to network devices, such as computers.
  • DNS DNS is the abbreviation for Domain Name
    System, which refers to a hierarchical naming
    system for resources that use the Internet or a
    private network. A DNS uses a decentralized
    naming system. It converts domain names to their
    corresponding numerical IP addresses. It serves
    the function of locating as well as identifying
    devices and services with the underlying network
    protocols. It assigns domain names and maps those
    to respective Internet resources. This is
    attained through the allocation of authoritative
    name servers for every domain. Moreover, it
    specifies the DNS protocol.
  • Domain Name A domain name is a websites address
    which is typed in the browser URL bar for
    accessing the website.
  • Disaster Recovery Disaster recovery, as an area
    of security planning, includes policies,
    procedures and tools that aid in the recovery and
    proper continuation of essential technology
    infrastructure post an untoward incident, such as
    a natural or man-made disaster.

12
Edge Computing, Encryption, Endpoint Security,
Ethernet
  • Edge Computing As a distributed computing
    paradigm, edge computing, serves to bring data
    storage as well as computation closer to the
    location where it is required. This not only aids
    in improving response time but also saves
    bandwidth.
  • Encryption Encryption refers to the process of
    encoding information. The process of encryption
    renders readable text into an undecipherable form
    that can be decrypted via a decryption key. It
    ensures data security which is crucial for
    sensitive information. In encryption, the
    original representation of any information
    (plaintext) is converted into another form
    (ciphertext). A ciphertext can be converted into
    plaintext by authorized parties in order to
    access the original form of the information.
  • Endpoint Security Endpoint security ensures the
    protection of networks, which are bridged to
    clients devices remotely. Endpoints on a network
    or in a cloud are protected against cyberattacks
    through systems that have to do with endpoint
    security.
  • Ethernet Ethernet refers to a type of
    communication protocol which connects computers
    that exist within a LAN (Local Area Network) or a
    WAN (Wide Area Network).

13
Thanks!
  • ANY QUESTIONS?
  • www.htshosting.org
Write a Comment
User Comments (0)
About PowerShow.com