The subnet mask is used in conjunction with the network address to determine which part of the address is the network address and which part is the host address.
A subnet mask may look like 255.255.255.0 which means the first 3 bytes are part of the network and the last byte is the address of the host on the subnet.
Another way to write the same network mask as above is /24 which means the 24 first bits (8 bits * 3 bytes) are part of the network.
The CTA is the primary usier interface element (button, link, form...) that asks the user to take the action the website would like its visitors to take. This results in a "Conversion".
Examples: "Buy now" button, "Sign up", "Download now", "Subscribe here"...
XML stands for eXtensible Markup Language.
It is a way of organizing text and/or contents with tags. Tags look like this:
Of course, although possible, this is not designed to be read by humans. It is designed to be processed by machines. Typically one program generates an XML document and another one computes it to some further extent.
And XML document very much looks like an HTML document, except that the tags are different.
There are actually many different dialects of XML, each for a different purpose. Each of these dialects has its own tags. And even more tags can be added. Hence the "eXtensible" in the name.
There is an XML dialect for writing web pages. It is called XHTML. It is basically the same thing as HTML except for minor syntaxic differences. For example in HYML you would write <BR> whereas in XML you would write <br />.
iTunes™ is a software application developed by Apple. It is available for Mac OS and Windows and can be downloaded freely from apple.com.
iTunes' original purpose was to allows you to manage your digital music library (mp3, aac, etc.), listen to music on your computer and synchronize your music with your iPod.
iTunes evolved into a media manager not just handling music/"tunes" but also Movies, TV Shows, Podcasts and more.
iTunes is required to access the iTunes store which lets you purchase music, videos and othe rmedia but also applications for the iPhone, as well as ringtones.
More info: http://www.apple.com/itunes/download/
Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE 802.11 standard to provide the same level of security as the one of a wired LAN.
WEP provides security by encrypting data sent wirelessly so that it is protected as it is transmitted from one end point to another.
WEP is not regarded as very secure in the industry.
International non-profit, professional organization for the advancement of technology related to electricity.
The Joint Photographic Experts Group (JPEG) algorythm is a very commonly used method of compression for photographic images. It is also a file format used for storing or transmitting photos.
The JPEG algorythm is lossy which means some details of the original picture are lost when compressing the algorythm. The algorythm has a quality setting allowing to set a balance between smaller file size and better quality.
Network protocol used for automatic configuration of IP computers/devices. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts.
:: Next >>