SlideShare a Scribd company logo
Important
Terminology for the
Users of Web-based
Services
Table of Contents
2
Access point, Alias, Authentication
Application Programming Interface
(API), APT Threats
Bandwidth, Blockchain, Break/Fix,
BYOD
Cache, Cloud
Cookies, Content Management
System
Cross-platform Software,
Cascading Style Sheets (CSS)
Database, Data center, Data
Loss Prevention
DHCP, DNS, Domain, Domain
Name, Disaster Recovery
Edge Computing, Encryption,
Endpoint Security, Ethernet
 Access point: An access point refers to a device which enables the communication of wireless-
equipped computers and other devices with a wired network.
 Alias: An alias, which is also referred to as a “nickname”, is usually used in e-mail applications. It is an
easy to remember name that is meant to be used for a more complicated and lengthier name.
 Authentication: Authentication is the process that caters to verification of the identity of a user or a
process. In it, a set of credentials serve the purpose of identification by being associated with an
incoming request.
3
Access point,Alias,Authentication
 Application Programming Interface (API): An application programming interface refers to a
computing interface which specifies interactions among multiple intermediaries of software. It can be
designed as per some industry-standard or it can be specific to a component or custom. Modular
programming is enabled by an API. This lets users use an application programming interface
independently of the implementation
 APT: APT refers to an advanced persistent threat. It usually refers to a state-sponsored group which
presents a threat by enabling unauthorized access to a network and by successfully remaining
undetected for a long duration.
4
Application Programming Interface (API),APTThreats
 Bandwidth: Bandwidth refers to the amount of data which is capable of being transmitted over a
network at any particular time. If a network’s bandwidth is high then it implies that the volume of data
that can be transmitted is high. It is usually measured in bps (bits per second).
 Blockchain: A blockchain refers to a specific type of database which stores data in blocks which are
chained. In it, every block has a cryptographic hash of the timestamp and transaction data of the
previous block. Its design renders it resistant to alterations in data.
 Break/Fix: Break/fix is an IT service model through which IT services that are provided are billed on
an as-needed basis. In it the client is billed only for the work done and doesn’t have to pay any fixed fee
for the ongoing service.
 BYOD: BYOD refers to “Bring Your Own Device” and is a policy related to business and technology
which lets employees use their personal mobile devices for accessing company data.
5
Bandwidth, Blockchain, Break/Fix, BYOD
6
1-800-123 -8156
Whoa!That’s a big number, aren’t
you proud?
 Cache: A cache refers to a set of files that are saved on one’s hard disk and aid one’s browser with
regard to displaying those pages more quickly that have been visited previously.
 Cloud: A cloud makes it possible to have computer system resources’ on-demand availability. Clouds
can be restricted to the use of a single company. In this case these are referred to as enterprise clouds.
Clouds can be available for the use of multiple companies, wherein these are known as public clouds.
Clouds refer to servers that can be accessed over the Internet along with the databases and the
software that run on such servers. A cloud enables its users to access applications and files from any
device at any time.
To digress, clouds are used in cloud hosting. Cloud hosting is a type of web hosting service which makes it
possible to access websites over the Internet. This service is provided by web hosting companies and the
most popular web hosting companies are usually referred to as the “Best Cloud Hosting Company”, the
“Best Website Hosting Company”, the “Best Windows Hosting Company” etc.
7
Cache, Cloud
 Cookies: Cookies refer to text files that have data that serve to identify one’s computer when one is
using a computer network. Cookies get created when one uses one’s browser to visit a site which uses
cookies to track visitors’ movement within the website. Moreover, cookies aid in resuming a visitor’s
browsing on that site, storing his/her login details, preferences as well as customization functions.
 Content Management System: CMS is the abbreviation for Content Management System. It is
essentially a software through which users can create, manage as well as modify a website’s content
easily without being dependent on any technical know-how. It is a tool for building websites that
eliminates the dependency on writing codes for this purpose. It is software platform which enables the
creation of web content and its editing, archiving, reporting, publishing, distribution etc.
8
Cookies, Content Management System
 Cross-platform Software: A cross-platform software refers to a computer software which has been
implemented on many computing platforms. Such a software can be of two types. One of these needs
individual compilation for every platform that it supports. The other type is capable of being run
directly on any platform without the need for any special preparation.
 Cascading Style Sheets (CSS): A CSS is used to style web documents. Cascading Style Sheets is a
style sheet language which specifies the presentation of a document that is written in a markup
language. It enables the separation of content and presentation.
9
Cross-platform Software, Cascading Style Sheets (CSS)
 Database: A database refers to data that exist in an organized collection. It is usually stored and
accessed electronically.A database renders data management easy.
 Data Center: A data center refers to a physical facility which is used by businesses for housing their
critical data and applications. A data center delivers shared data and applications through a network of
resources that are related to computing and storage.
 Data Loss Prevention (DLP): DLP is the abbreviation for Data Loss Prevention and refers to a
collection of processes along with the tools that are meant to prevent the loss of data, unauthorized
access to data and the misuse of data. DLP tools monitor as well as control endpoint activities. It is
meant to protect data that is in motion while in network traffic or in use which include endpoint
actions or at rest during data storage.
10
Database, Data Center, Data Loss Prevention
 DHCP: DHCP is the abbreviation for Dynamic Host Configuration Protocol. It is a protocol for
network management through which a server that is on a local network is able to assign temporary IP
addresses to network devices, such as computers.
 DNS: DNS is the abbreviation for Domain Name System, which refers to a hierarchical naming system
for resources that use the Internet or a private network. A DNS uses a decentralized naming system. It
converts domain names to their corresponding numerical IP addresses. It serves the function of
locating as well as identifying devices and services with the underlying network protocols. It assigns
domain names and maps those to respective Internet resources. This is attained through the allocation
of authoritative name servers for every domain. Moreover, it specifies the DNS protocol.
 Domain Name: A domain name is a website’s address which is typed in the browser URL bar for
accessing the website.
 Disaster Recovery: Disaster recovery, as an area of security planning, includes policies, procedures
and tools that aid in the recovery and proper continuation of essential technology infrastructure post
an untoward incident, such as a natural or man-made disaster.
11
DHCP, DNS, Domain Name, Disaster Recovery
 Edge Computing: As a distributed computing paradigm, edge computing, serves to bring data storage
as well as computation closer to the location where it is required. This not only aids in improving
response time but also saves bandwidth.
 Encryption: Encryption refers to the process of encoding information. The process of encryption
renders readable text into an undecipherable form that can be decrypted via a decryption key. It
ensures data security which is crucial for sensitive information. In encryption, the original
representation of any information (plaintext) is converted into another form (ciphertext). A ciphertext
can be converted into plaintext by authorized parties in order to access the original form of the
information.
 Endpoint Security: Endpoint security ensures the protection of networks, which are bridged to
clients’ devices remotely. Endpoints on a network or in a cloud are protected against cyberattacks
through systems that have to do with endpoint security.
 Ethernet: Ethernet refers to a type of communication protocol which connects computers that exist
within a LAN (Local Area Network) or a WAN (Wide Area Network).
12
Edge Computing, Encryption, Endpoint Security, Ethernet
13
Thanks!
ANY QUESTIONS?
www.htshosting.org

More Related Content

What's hot

Frequently Used Terms in Data Centers
Frequently Used Terms in Data CentersFrequently Used Terms in Data Centers
Frequently Used Terms in Data Centers
HTS Hosting
 
Which New Jersey Data Centers Embrace Managed Services? (SlideShare)
Which New Jersey Data Centers Embrace Managed Services? (SlideShare)Which New Jersey Data Centers Embrace Managed Services? (SlideShare)
Which New Jersey Data Centers Embrace Managed Services? (SlideShare)
SP Home Run Inc.
 
Data center
Data centerData center
Data center
Jwala Chapagai
 
Data center proposal
Data center proposalData center proposal
Data center proposal
Muhammad Ahad
 
Compliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersCompliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centers
Livin Jose
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
mazin Salih
 
Alteryx Presentation
Alteryx PresentationAlteryx Presentation
Alteryx Presentation
Mohd Abu Taurab
 
Do you know virtual data center
Do you know virtual data centerDo you know virtual data center
Do you know virtual data center
Monica Geller
 
Traditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersTraditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data Centers
Shreya Srivastava
 
InfoRelay National Data Centers Overview
InfoRelay National Data Centers OverviewInfoRelay National Data Centers Overview
InfoRelay National Data Centers Overview
Jonathan Maxim
 
Data centers
Data centersData centers
Data centers
tejaswi25
 
Data Centers: The Pillars of Digital Economy
Data Centers: The Pillars of Digital EconomyData Centers: The Pillars of Digital Economy
Data Centers: The Pillars of Digital Economy
HTS Hosting
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?
Fern Xu
 
Cloud based-data centers
Cloud based-data centersCloud based-data centers
Cloud based-data centers
Shreya Srivastava
 
What are the types of data centers
What are the types of data centersWhat are the types of data centers
What are the types of data centers
Livin Jose
 
Centralised and distributed databases
Centralised and distributed databasesCentralised and distributed databases
Centralised and distributed databases
Forrester High School
 
Data Center Tiers Explained
Data Center Tiers ExplainedData Center Tiers Explained
Data Center Tiers Explained
Data Cave
 
Data Centers In US
Data Centers In USData Centers In US
Data Centers In US
msirmajritchie
 
Data center
Data centerData center
Data center
Mohammad Danish
 
Data center
Data centerData center
Data center
Shreya Srivastava
 

What's hot (20)

Frequently Used Terms in Data Centers
Frequently Used Terms in Data CentersFrequently Used Terms in Data Centers
Frequently Used Terms in Data Centers
 
Which New Jersey Data Centers Embrace Managed Services? (SlideShare)
Which New Jersey Data Centers Embrace Managed Services? (SlideShare)Which New Jersey Data Centers Embrace Managed Services? (SlideShare)
Which New Jersey Data Centers Embrace Managed Services? (SlideShare)
 
Data center
Data centerData center
Data center
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Compliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersCompliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centers
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 
Alteryx Presentation
Alteryx PresentationAlteryx Presentation
Alteryx Presentation
 
Do you know virtual data center
Do you know virtual data centerDo you know virtual data center
Do you know virtual data center
 
Traditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data CentersTraditioanal vs-cloud based Data Centers
Traditioanal vs-cloud based Data Centers
 
InfoRelay National Data Centers Overview
InfoRelay National Data Centers OverviewInfoRelay National Data Centers Overview
InfoRelay National Data Centers Overview
 
Data centers
Data centersData centers
Data centers
 
Data Centers: The Pillars of Digital Economy
Data Centers: The Pillars of Digital EconomyData Centers: The Pillars of Digital Economy
Data Centers: The Pillars of Digital Economy
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?
 
Cloud based-data centers
Cloud based-data centersCloud based-data centers
Cloud based-data centers
 
What are the types of data centers
What are the types of data centersWhat are the types of data centers
What are the types of data centers
 
Centralised and distributed databases
Centralised and distributed databasesCentralised and distributed databases
Centralised and distributed databases
 
Data Center Tiers Explained
Data Center Tiers ExplainedData Center Tiers Explained
Data Center Tiers Explained
 
Data Centers In US
Data Centers In USData Centers In US
Data Centers In US
 
Data center
Data centerData center
Data center
 
Data center
Data centerData center
Data center
 

Similar to Important Terminology for the Users of Web-based Services

Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
ojaswiniwagh
 
Cad
CadCad
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
 
Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
Karan Kukreja
 
El35782786
El35782786El35782786
El35782786
IJERA Editor
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Monika Kumari
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
Lahore Garrison University
 
English ._..pptx
English ._..pptxEnglish ._..pptx
English ._..pptx
AndrsLpez752065
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
SANKET SENAPATI
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Arysha Channa
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux Platform
IJCSIS Research Publications
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
AmitSingh770691
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 

Similar to Important Terminology for the Users of Web-based Services (20)

Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cad
CadCad
Cad
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
 
El35782786
El35782786El35782786
El35782786
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Quiz 1 cloud computing
Quiz 1 cloud computing Quiz 1 cloud computing
Quiz 1 cloud computing
 
English ._..pptx
English ._..pptxEnglish ._..pptx
English ._..pptx
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux Platform
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Dce rpc
Dce rpcDce rpc
Dce rpc
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
HTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
HTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
HTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
HTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
HTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
HTS Hosting
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
HTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
HTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
HTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
HTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
HTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
HTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
HTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
HTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
HTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
HTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
HTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Important Terminology for the Users of Web-based Services

  • 1. Important Terminology for the Users of Web-based Services
  • 2. Table of Contents 2 Access point, Alias, Authentication Application Programming Interface (API), APT Threats Bandwidth, Blockchain, Break/Fix, BYOD Cache, Cloud Cookies, Content Management System Cross-platform Software, Cascading Style Sheets (CSS) Database, Data center, Data Loss Prevention DHCP, DNS, Domain, Domain Name, Disaster Recovery Edge Computing, Encryption, Endpoint Security, Ethernet
  • 3.  Access point: An access point refers to a device which enables the communication of wireless- equipped computers and other devices with a wired network.  Alias: An alias, which is also referred to as a “nickname”, is usually used in e-mail applications. It is an easy to remember name that is meant to be used for a more complicated and lengthier name.  Authentication: Authentication is the process that caters to verification of the identity of a user or a process. In it, a set of credentials serve the purpose of identification by being associated with an incoming request. 3 Access point,Alias,Authentication
  • 4.  Application Programming Interface (API): An application programming interface refers to a computing interface which specifies interactions among multiple intermediaries of software. It can be designed as per some industry-standard or it can be specific to a component or custom. Modular programming is enabled by an API. This lets users use an application programming interface independently of the implementation  APT: APT refers to an advanced persistent threat. It usually refers to a state-sponsored group which presents a threat by enabling unauthorized access to a network and by successfully remaining undetected for a long duration. 4 Application Programming Interface (API),APTThreats
  • 5.  Bandwidth: Bandwidth refers to the amount of data which is capable of being transmitted over a network at any particular time. If a network’s bandwidth is high then it implies that the volume of data that can be transmitted is high. It is usually measured in bps (bits per second).  Blockchain: A blockchain refers to a specific type of database which stores data in blocks which are chained. In it, every block has a cryptographic hash of the timestamp and transaction data of the previous block. Its design renders it resistant to alterations in data.  Break/Fix: Break/fix is an IT service model through which IT services that are provided are billed on an as-needed basis. In it the client is billed only for the work done and doesn’t have to pay any fixed fee for the ongoing service.  BYOD: BYOD refers to “Bring Your Own Device” and is a policy related to business and technology which lets employees use their personal mobile devices for accessing company data. 5 Bandwidth, Blockchain, Break/Fix, BYOD
  • 6. 6 1-800-123 -8156 Whoa!That’s a big number, aren’t you proud?
  • 7.  Cache: A cache refers to a set of files that are saved on one’s hard disk and aid one’s browser with regard to displaying those pages more quickly that have been visited previously.  Cloud: A cloud makes it possible to have computer system resources’ on-demand availability. Clouds can be restricted to the use of a single company. In this case these are referred to as enterprise clouds. Clouds can be available for the use of multiple companies, wherein these are known as public clouds. Clouds refer to servers that can be accessed over the Internet along with the databases and the software that run on such servers. A cloud enables its users to access applications and files from any device at any time. To digress, clouds are used in cloud hosting. Cloud hosting is a type of web hosting service which makes it possible to access websites over the Internet. This service is provided by web hosting companies and the most popular web hosting companies are usually referred to as the “Best Cloud Hosting Company”, the “Best Website Hosting Company”, the “Best Windows Hosting Company” etc. 7 Cache, Cloud
  • 8.  Cookies: Cookies refer to text files that have data that serve to identify one’s computer when one is using a computer network. Cookies get created when one uses one’s browser to visit a site which uses cookies to track visitors’ movement within the website. Moreover, cookies aid in resuming a visitor’s browsing on that site, storing his/her login details, preferences as well as customization functions.  Content Management System: CMS is the abbreviation for Content Management System. It is essentially a software through which users can create, manage as well as modify a website’s content easily without being dependent on any technical know-how. It is a tool for building websites that eliminates the dependency on writing codes for this purpose. It is software platform which enables the creation of web content and its editing, archiving, reporting, publishing, distribution etc. 8 Cookies, Content Management System
  • 9.  Cross-platform Software: A cross-platform software refers to a computer software which has been implemented on many computing platforms. Such a software can be of two types. One of these needs individual compilation for every platform that it supports. The other type is capable of being run directly on any platform without the need for any special preparation.  Cascading Style Sheets (CSS): A CSS is used to style web documents. Cascading Style Sheets is a style sheet language which specifies the presentation of a document that is written in a markup language. It enables the separation of content and presentation. 9 Cross-platform Software, Cascading Style Sheets (CSS)
  • 10.  Database: A database refers to data that exist in an organized collection. It is usually stored and accessed electronically.A database renders data management easy.  Data Center: A data center refers to a physical facility which is used by businesses for housing their critical data and applications. A data center delivers shared data and applications through a network of resources that are related to computing and storage.  Data Loss Prevention (DLP): DLP is the abbreviation for Data Loss Prevention and refers to a collection of processes along with the tools that are meant to prevent the loss of data, unauthorized access to data and the misuse of data. DLP tools monitor as well as control endpoint activities. It is meant to protect data that is in motion while in network traffic or in use which include endpoint actions or at rest during data storage. 10 Database, Data Center, Data Loss Prevention
  • 11.  DHCP: DHCP is the abbreviation for Dynamic Host Configuration Protocol. It is a protocol for network management through which a server that is on a local network is able to assign temporary IP addresses to network devices, such as computers.  DNS: DNS is the abbreviation for Domain Name System, which refers to a hierarchical naming system for resources that use the Internet or a private network. A DNS uses a decentralized naming system. It converts domain names to their corresponding numerical IP addresses. It serves the function of locating as well as identifying devices and services with the underlying network protocols. It assigns domain names and maps those to respective Internet resources. This is attained through the allocation of authoritative name servers for every domain. Moreover, it specifies the DNS protocol.  Domain Name: A domain name is a website’s address which is typed in the browser URL bar for accessing the website.  Disaster Recovery: Disaster recovery, as an area of security planning, includes policies, procedures and tools that aid in the recovery and proper continuation of essential technology infrastructure post an untoward incident, such as a natural or man-made disaster. 11 DHCP, DNS, Domain Name, Disaster Recovery
  • 12.  Edge Computing: As a distributed computing paradigm, edge computing, serves to bring data storage as well as computation closer to the location where it is required. This not only aids in improving response time but also saves bandwidth.  Encryption: Encryption refers to the process of encoding information. The process of encryption renders readable text into an undecipherable form that can be decrypted via a decryption key. It ensures data security which is crucial for sensitive information. In encryption, the original representation of any information (plaintext) is converted into another form (ciphertext). A ciphertext can be converted into plaintext by authorized parties in order to access the original form of the information.  Endpoint Security: Endpoint security ensures the protection of networks, which are bridged to clients’ devices remotely. Endpoints on a network or in a cloud are protected against cyberattacks through systems that have to do with endpoint security.  Ethernet: Ethernet refers to a type of communication protocol which connects computers that exist within a LAN (Local Area Network) or a WAN (Wide Area Network). 12 Edge Computing, Encryption, Endpoint Security, Ethernet