• File format used to exchange data between disparate applications. The file format, originally
    introduced by Microsoft Excel, has become a de facto standard throughout the industry, even among non-Microsoft platforms.

    File format used to exchange data between disparate applications. The file format, originally
    introduced by Microsoft Excel, has become a de facto standard throughout the industry, even among non-Microsoft platforms.

  • Adobe Photoshop is the most widely used photo editing software in the world.

    It is also heavily used by graphic designers to create logos, buttons and other graphics for web sites.

    Adobe Photoshop is the most widely used photo editing software in the world.

    It is also heavily used by graphic designers to create logos, buttons and other graphics for web sites.

  • DNS is a system that stores information associated with domain names in a distributed database on networks such as the Internet.

    For example, when you type in a domain name like, for example, mozilla.org, you computer will automatically query the Domain Name System to find the actual IP address of the server you are trying to reach, for instance: 63.245.209.11.

    You can see that query in more detail by opening a command window and typing in:
    nslookup mozilla.org

    DNS is a system that stores information associated with domain names in a distributed database on networks such as the Internet.

    For example, when you type in a domain name like, for example, mozilla.org, you computer will automatically query the Domain Name System to find the actual IP address of the server you are trying to reach, for instance: 63.245.209.11.

    You can see that query in more detail by opening a command window and typing in:
    nslookup mozilla.org

  • Network protocol used for automatic configuration of IP computers/devices. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts.

    Network protocol used for automatic configuration of IP computers/devices. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts.

  • The subnet mask is used in conjunction with the network address to determine which part of the address is the network address and which part is the host address.

    A subnet mask may look like 255.255.255.0 which means the first 3 bytes are part of the network and the last byte is the address of the host on the subnet.

    Another way to write the same network mask as above is /24 which means the 24 first bits (8 bits * 3 bytes) are part of the network.

    The subnet mask is used in conjunction with the network address to determine which part of the address is the network address and which part is the host address.

    A subnet mask may look like 255.255.255.0 which means the first 3 bytes are part of the network and the last byte is the address of the host on the subnet.

    Another way to write the same network mask as above is /24 which means the 24 first bits (8 bits * 3 bytes) are part of the network.

  • Frame-based computer networking technology used in local area networks (LANs). Ethernet defines wiring and signaling for the physical layer, and frame formats and protocols for the media access control (MAC)/data link layer of the OSI model. Ethernet is mostly standardized as IEEE 802.3.

    It has become the most widespread LAN technology since the 1990s.

    Frame-based computer networking technology used in local area networks (LANs). Ethernet defines wiring and signaling for the physical layer, and frame formats and protocols for the media access control (MAC)/data link layer of the OSI model. Ethernet is mostly standardized as IEEE 802.3.

    It has become the most widespread LAN technology since the 1990s.

  • The Joint Photographic Experts Group (JPEG) algorythm is a very commonly used method of compression for photographic images. It is also a file format used for storing or transmitting photos.

    The JPEG algorythm is lossy which means some details of the original picture are lost when compressing the algorythm. The algorythm has a quality setting allowing to set a balance between smaller file size and better quality.

    The Joint Photographic Experts Group (JPEG) algorythm is a very commonly used method of compression for photographic images. It is also a file format used for storing or transmitting photos.

    The JPEG algorythm is lossy which means some details of the original picture are lost when compressing the algorythm. The algorythm has a quality setting allowing to set a balance between smaller file size and better quality.

  • A network protocol used by a network client to obtain its IP address automatically. This is usually done during the bootstrap process of computers or operating systems running on them. The BOOTP servers assign the IP address from a pool of addresses to each client. BOOTP enables 'diskless workstation' computers as well as other networked devices (printers...) to obtain an IP address prior to loading any advanced operating system.

    A network protocol used by a network client to obtain its IP address automatically. This is usually done during the bootstrap process of computers or operating systems running on them. The BOOTP servers assign the IP address from a pool of addresses to each client. BOOTP enables 'diskless workstation' computers as well as other networked devices (printers...) to obtain an IP address prior to loading any advanced operating system.

  • CRO is the method of improving the performance of a website, not by directing more traffic to it, but instead by getting a higher proportion of the existing traffic to convert.

    The underlying assumption is that each website has a purpose and is trying to get its visitors to take some action. Therefore it should have a Call To Action (CTA). CRO uses different methods to get people to follow the CTA.

    Sometimes it means making the CTA more prominent, or more explicit. Sometimes, it means removing distractions or friction in the process.

    CRO is the method of improving the performance of a website, not by directing more traffic to it, but instead by getting a higher proportion of the existing traffic to convert.

    The underlying assumption is that each website has a purpose and is trying to get its visitors to take some action. Therefore it should have a Call To Action (CTA). CRO uses different methods to get people to follow the CTA.

    Sometimes it means making the CTA more prominent, or more explicit. Sometimes, it means removing distractions or friction in the process.

  • A bitmapped image format used internally by the Microsoft Windows graphics subsystem (GDI), and used commonly as a simple graphics file format on Windows.

    A bitmapped image format used internally by the Microsoft Windows graphics subsystem (GDI), and used commonly as a simple graphics file format on Windows.