Concise definitions on frequent terms

Subnet Mask

  12/06/13 19:00, by admin, Categories: Networks

The subnet mask is used in conjunction with the network address to determine which part of the address is the network address and which part is the host address.

A subnet mask may look like 255.255.255.0 which means the first 3 bytes are part of the network and the last byte is the address of the host on the subnet.

Another way to write the same network mask as above is /24 which means the 24 first bits (8 bits * 3 bytes) are part of the network.

Automatic Document Feeder (ADF)

  08/26/08 01:43, by admin, Categories: Imaging

An Automatic Document Feeder (ADF) is a mechanism that will automatically feed an original sheet of paper so that a printer can scan some amount of the paper at once.

Call To Action (CTA)

  09/24/13 22:39, by admin, Categories: Marketing

The CTA is the primary usier interface element (button, link, form...) that asks the user to take the action the website would like its visitors to take. This results in a "Conversion".

Examples: "Buy now" button, "Sign up", "Download now", "Subscribe here"...

eXtensible Markup Language (XML)

  08/24/08 10:57, by admin, Categories: Uncategorized

XML stands for eXtensible Markup Language.

It is a way of organizing text and/or contents with tags. Tags look like this:

<sometag>some content</sometag>

Of course, although possible, this is not designed to be read by humans. It is designed to be processed by machines. Typically one program generates an XML document and another one computes it to some further extent.

And XML document very much looks like an HTML document, except that the tags are different.

There are actually many different dialects of XML, each for a different purpose. Each of these dialects has its own tags. And even more tags can be added. Hence the "eXtensible" in the name.

There is an XML dialect for writing web pages. It is called XHTML. It is basically the same thing as HTML except for minor syntaxic differences. For example in HYML you would write <BR> whereas in XML you would write <br />.

Other XML dialects include RSS and Atom.

iTunes

  08/08/09 19:20, by admin, Categories: Uncategorized

iTunes™ is a software application developed by Apple. It is available for Mac OS and Windows and can be downloaded freely from apple.com.

iTunes' original purpose was to allows you to manage your digital music library (mp3, aac, etc.), listen to music on your computer and synchronize your music with your iPod.

iTunes evolved into a media manager not just handling music/"tunes" but also Movies, TV Shows, Podcasts and more.

iTunes is required to access the iTunes store which lets you purchase music, videos and othe rmedia but also applications for the iPhone, as well as ringtones.

More info: http://www.apple.com/itunes/download/

WEP

  01/17/15 02:48, by admin, Categories: Uncategorized

Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE 802.11 standard to provide the same level of security as the one of a wired LAN.

WEP provides security by encrypting data sent wirelessly so that it is protected as it is transmitted from one end point to another.

WEP is not regarded as very secure in the industry. 

Dual Inline Memory Module (DIMM)

  08/26/08 02:01, by admin, Categories: Uncategorized

A small circuit board that holds memory.

Institute of Electrical and Electronics Engineers (IEEE)

  08/26/08 07:49, by admin, Categories: Uncategorized

International non-profit, professional organization for the advancement of technology related to electricity.

JPEG or JPG

  10/03/09 21:14, by sandeepbk, Categories: Imaging

The Joint Photographic Experts Group (JPEG) algorythm is a very commonly used method of compression for photographic images. It is also a file format used for storing or transmitting photos.

The JPEG algorythm is lossy which means some details of the original picture are lost when compressing the algorythm. The algorythm has a quality setting allowing to set a balance between smaller file size and better quality.

Dynamic Host Configuration Protocol (DHCP)

  08/26/08 01:57, by admin, Categories: Networks

Network protocol used for automatic configuration of IP computers/devices. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts.

::