Browser

A browser is a free software program or mobile app that displays web pages, graphics, and other online content. Popular web browsers include Chrome, Firefox, Internet Explorer, Microsoft Edge, and Safari, but there are many others. Internet users access the web through web browser software, which is included in or can be downloaded on computers and mobile devices. Each web page has a unique address called a URL, which can be entered in a browser’s address bar to navigate directly to a site. Browser software is specifically designed to convert HTML and XML computer code into human-readable documents.

Web Page

A web page is what you see in a web browser when you’re on the internet. You are on a web page right now. Think of the web page as a page in a magazine. You may see text, photos, images, diagrams, links, advertisements, and more on any page you view. Often, you click or tap on a specific area of a web page to expand the information or move to a related web page. Clicking a link, which is a snippet of text that appears in a color different from the rest of the text, takes you to a different web page. If you want to go back, use the arrow buttons provided for that purpose.

URL

Uniform Resource Locators (URLs) are the web browser addresses of internet pages and files. With a URL, you can locate and bookmark specific pages and files in a web browser. Here is an example format of a URL: http://www.examplewebsite.com/mypage This format is frequently shortened to this: www.examplewebsite.com/mypage  Sometimes URLs are longer and more complicated, but all follow acknowledged rules for naming. URLs consist of three parts:

Protocol: The protocol is the portion ending in //:. Most web pages use the protocol http or https, but there are other protocols. Host: The host or top-level domain frequently ends in .com, .net, .edu, or .org but can also end in one of many others that have been officially recognized. Filename: The filename or page name.

HTTP and HTTPS

HTTP is the acronym for Hypertext Transfer Protocol—the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in a web browser. HTTPS is the acronym for Hypertext Transfer Protocol Secure. This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others. Whenever you log in to your online bank account or a shopping site that you enter credit card information into, look for https in the URL for security.

HTML and XML

Hypertext Markup Language (HTML) is the programming language of web pages. HTML commands a web browser to display text and graphics in a specific fashion. Beginning internet users don’t need to know HTML coding to enjoy the web pages the programming language delivers to browsers. XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. 

IP Address

Your computer and every device that connects to the internet uses an Internet Protocol (IP) address for identification. In most cases, IP addresses are assigned automatically. Beginners don’t usually need to assign an IP address. An IP address may look something like this: 202.3.104.55 Or, like this: 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A Every computer, smartphone, and mobile device that accesses the internet is assigned an IP address for tracking purposes. It may be a permanently assigned IP address, or the IP address may change occasionally, but it is always a unique identifier. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address serves as the equivalent of an automobile license plate to enforce accountability and traceability.

ISP

You need an internet service provider (ISP) to gain access to the internet. You may access a free ISP at school, a library, or work, or you may pay for a private ISP at home. An ISP is the company or government organization that plugs you into the internet. An ISP offers a variety of services for a variety of prices: web page access, email, web page hosting, and so on. Most ISPs provide various internet connection speeds for a monthly fee. You may choose to pay more for a higher-speed internet connection if you like to stream movies or select a less expensive package if you use the internet mostly for light browsing and email.

Router

A router or router-modem combination is the hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP. A router can be wired or wireless or both. A router provides a defense against hackers and directs content to the specific computer, device, streaming device, or printer that should receive it. Often your ISP provides the network router it prefers for your internet service. When it does, the router is configured appropriately. If you choose to use a different router, you may need to enter information into it.

Email

Email is electronic mail. It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service, such as Gmail or Yahoo Mail, or an installed software package, such as Microsoft Outlook or Apple Mail. Beginners start by creating one email address that they give to their family members and friends. However, you aren’t limited to one address or email service. You may choose to add other email addresses for online shopping, business, or social networking purposes.

Email Spam and Filters

Spam is the jargon name of unwanted and unsolicited email. Spam email comes in two main categories: high-volume advertising, which is annoying, and hackers attempting to lure you into divulging your passwords, which is dangerous. Filtering is the popular, but imperfect, defense against spam. Filtering is included in many email clients. Filtering uses software that reads incoming emails for keyword combinations and then either deletes or quarantines messages that appear to be spam. Look for a spam or junk folder in your mailbox to view quarantined or filtered email. Anything that sounds too good to be true probably isn’t true. If you are unsure, do not click any links in the email and contact the sender (your bank or whomever) separately for validation.

Social Media

Social media is the broad term for any online tool that enables users to interact with thousands of other users. Facebook and Twitter are among the largest social networking sites. LinkedIn is a combination of a social and professional site. Other popular sites include YouTube, Instagram, Pinterest, Snapchat, Tumblr, and Reddit. Social media sites offer free accounts to everyone. When selecting the ones that interest you, ask your friends and family which ones they belong to. That way, you can join a group where you know people. As with all things internet-related, protect your personal information when you sign up for sites. Most social media sites offer a privacy section where you can choose what to reveal to other users of the website.

E-Commerce

E-commerce is electronic commerce, the transactions of selling and buying online. Every day, billions of dollars exchange hands through the internet and the World Wide Web. Internet shopping has exploded in popularity with internet users, to the detriment of traditional brick-and-mortar stores and malls. Every well-known retailer has a website that showcases and sells its products. Joining them are dozens of small sites that sell products and enormous sites that sell just about everything. E-commerce works because reasonable privacy can be assured through HTTPS secure web pages that encrypt personal information and because reliable businesses value the internet as a transaction medium and make the process simple and safe.

Encryption and Authentication

Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. When reliable encryption is in place, banking information and credit card numbers are kept private. Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are.

Downloading

Downloading is a broad term that describes transferring something you find on the internet or the World Wide Web to your computer or another device. Commonly, downloading is associated with songs, music, software, and media files. For example, you might want to download a song or a trial copy of Microsoft Office. The larger the file you are copying, the longer the download takes to transfer to your computer. Some downloads take seconds; some take minutes or longer, depending on your internet speed.

Cloud Computing

Cloud computing began as a term to describe software that was online and borrowed, instead of purchased and installed on a computer. Web-based email is one example of cloud computing. The user’s email is stored and accessed in the cloud of the internet. The cloud is the modern version of the 1970s mainframe computing model. As part of the cloud computing model is software as a service (SaaS). SaaS is a business model that assumes people would rather rent software than own it. With their web browsers, users access the cloud on the internet and log in to their online rented copies of their cloud-based software. Increasingly, services offer cloud storage to access files from more than one device. It is possible to save files, photos, and images in the cloud and then access those files from a laptop, smartphone, tablet, or another device. Cloud computing makes collaboration among individuals on the same files in the cloud possible.

Firewall

Firewall is a generic term to describe a barrier against destruction. In the case of computing, a firewall consists of software or hardware that protects a computer from hackers and viruses. Computing firewalls range from small antivirus software packages to complex and expensive software and hardware solutions. ​Some firewalls are free. Many computers ship with a firewall you can activate. All computer firewalls offer some kind of safeguard against hackers vandalizing or taking over a computer system.

Malware

Malware is a broad term that describes any malicious software designed by hackers. Malware includes viruses, Trojans, keyloggers, zombie programs, and other software that seeks to do one of four things:

Vandalize your computer in some way.Steal your private information.Take remote control of your computer (zombie your computer).Manipulate you into purchasing something.

Malware programs are the time bombs and wicked minions of dishonest programmers. Protect yourself with a firewall and knowledge of how to prevent these programs from reaching your computer.

Trojan

A Trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software programs. Sometimes, it is an innocent-looking movie file or an installer that pretends to be actual anti-hacker software. The power of the Trojan attack comes from users naively downloading and running the Trojan file.

Phishing

Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords or PINs. Often in the form of fake PayPal warning messages or phony bank login screens, phishing attacks can be convincing to anyone who is not trained to watch for the subtle clues. As a rule, all users should distrust any email link that says, “You should log in and confirm this.”

Blogs

A blog is a modern online writer’s column. Amateur and professional writers publish blogs on all kinds of topics: hobby interests in paintball or tennis, opinions on health care, commentaries on celebrity gossip, photoblogs of favorite pictures, or tech tips on using Microsoft Office. Absolutely anyone can start a blog. Blogs are usually arranged chronologically and with less formality than a website. Many blogs accept and respond to comments. Blogs vary in quality from amateurish to professional. Some savvy bloggers earn reasonable incomes by selling advertising on their blog pages.