Please log in using your Hive Username and Password
Please contact Victoria at the office if you do not have a password.
For experienced database programmers and first-time database users alike, Microsoft Access delivers powerful tools for managing and analyzing data. With XML support, developers can create sophisticated enterprise-wide database solutions that integrate easily with our range of Windows Servers. back to top |
||||||||||||||||||||||||||||||||||
ADSL Asymmetrical Digital Subscriber Line (ADSL) enables the copper wire that carries the telephone signal into your home or office to transfer information in and out up to 30 times faster than you're used to. About a third of all homes and businesses can potentially use a broadband connection over copper wire. back to top |
||||||||||||||||||||||||||||||||||
ADSL Modem ADSL modems provide access to the internet via your ADSL connection. The internet connection is permanently open, so there's no need to dial up every time you want to browse the web, send emails or check messages. back to top |
||||||||||||||||||||||||||||||||||
Applet |
||||||||||||||||||||||||||||||||||
ATM |
||||||||||||||||||||||||||||||||||
A high-speed line or series of connections that forms a major pathway within a network. The term is relative as a backbone in a small network will likely be much smaller than many non-backbone lines in a large network. back to top |
||||||||||||||||||||||||||||||||||
Bandwidth How much stuff you can send through a connection. Usually measured in bits-per-second. A full page of English text is about 16,000 bits. A fast modem can move about 57,000 bits in one second. Full-motion full-screen video would require roughly 10,000,000 bits-per-second, depending on compression. back to top |
||||||||||||||||||||||||||||||||||
Bit (Binary DigIT) A single digit number in base-2, in other words, either a 1 or a zero. The smallest unit of computerized data. Bandwidth is usually measured in bits-per-second. back to top |
||||||||||||||||||||||||||||||||||
Blog (weB LOG) A blog is basically a journal that is available on the web. The activity of updating a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated daily using software that allows people with little or no technical background to update and maintain the blog. Postings on a blog are almost always arranged in chronological order with the most recent additions featured most prominantly. back to top |
||||||||||||||||||||||||||||||||||
Bps (Bits Per Second) speed at which data transfer is measured. back to top |
||||||||||||||||||||||||||||||||||
Broadband Broadband is a general term for technologies like cable modems, ADSL, wireless data and ATM. Broadband basically opens up the networks to provide virtually unlimited bandwidth. The most complex multimedia content comes streaming down the line as fast as you can click. Broadband means having much more speed to move your data - much more than you can get out of a conventional 56K modem. back to top |
||||||||||||||||||||||||||||||||||
Browser An piece of software which allows you to view web sites, usually Netscape Navigator or Microsoft Internet Explorer. back to top |
||||||||||||||||||||||||||||||||||
Byte |
||||||||||||||||||||||||||||||||||
A set of rules that describe how a Web Server communicates with another piece of software on the same machine, and how the other piece of software (the ?CGI program?) talks to the web server. Any piece of software can be a CGI program if it handles input and output according to the CGI standard. See also: Server, WWW back to top |
||||||||||||||||||||||||||||||||||
Cgi Bin The most common name of a directory on a web server in which CGI programs are stored. back to top |
||||||||||||||||||||||||||||||||||
Client A software program that is used to contact and obtain data from a Server software program on another computer, often across a great distance. EachClient program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client. See also: Browser, Client, Server back to top |
||||||||||||||||||||||||||||||||||
Co-location Most often used to refer to having a server that belongs to one person or group physically located on an Internet-connected network that belongs to another person or group. Usually this is done because the server owner wants their machine to be on a high-speed Internet connection and/or they do not want the security risks of having the server on their own network. back to top |
||||||||||||||||||||||||||||||||||
Contention Ratio |
||||||||||||||||||||||||||||||||||
Cookies |
||||||||||||||||||||||||||||||||||
MySQL is a highly regarded database engine which supports virtually all of the functionality of vastly more expensive database servers such as Oracle. The data is accessed using standard SQL. The following links will be of use to you: For general information about MySQL please see www.mysql.com We recommend this PHP MySQL administration software available from http://www.phpmyadmin.net/ This software can be used to create tables, add data from text files and carry out almost all database administration. back to top |
||||||||||||||||||||||||||||||||||
Database: SQL Our Servers currently support SQL Server 2000 and SQL Server Express 2005. Microsoft SQL Server is built from the ground up as a scalable, high-performance database management system designed specifically for the unique requirements of distributed client-server computing. SQL Server has been fulfilling this role in business-critical environments for several years. Microsoft SQL Server exceeds dependability requirements and provides innovative capabilities that increase employee effectiveness, integrate heterogeneous IT ecosystems, and maximize capital and operating budgets. Microsoft SQL Server provides the enterprise data management platform your organization needs to adapt quickly in a fast-changing environment. back to top |
||||||||||||||||||||||||||||||||||
Dial-up How most people connect to the internet by using their phone. Every time you want to get onto the internet your computer has to dial into the service. This is how most home users use the internet. It's an intermittent use of the internet instead of the always-on service supplied via by ADSL. back to top |
||||||||||||||||||||||||||||||||||
DNS (Domain Name System) The Domain Name System is the system that translates Internet domain names into IP numbers. A "DNS Server" is a server that performs this kind of translation. back to top |
||||||||||||||||||||||||||||||||||
Domain name |
||||||||||||||||||||||||||||||||||
back to top |
||||||||||||||||||||||||||||||||||
For many businesses, email has all but replaced fax, post - and even the phone. It's easy to use, doesn't interrupt, and leaves messages that are easy to pick up any time. Bear in mind that whatever your domain name is, your email address will use it. So if you buy swc.com, then your email address will be something@swc.com. There are 2 main sorts of email accounts, specific and catch-all. A specific account is something like david@swc.com, and any deviation from this will be lost, whereas a catch-all account collects everything on the domain, so it will pick up david@swc.com, dvid@swc.com, dave@swc.com and even kdu33882ftej@swc.com. back to top |
||||||||||||||||||||||||||||||||||
Emoticons These are the sideways smiles and frowns used in email to indicate emotions. E.g. :-) would indicate a smile and :-( would indicate a frown! back to top |
||||||||||||||||||||||||||||||||||
Ethernet A method of managing data traffic, or information, across a local area network. back to top |
||||||||||||||||||||||||||||||||||
Extranet A secure link between two or more intranets that allows businesses and other organisations to work together and share files. back to top |
||||||||||||||||||||||||||||||||||
A device that fences off your private network from the outside world of the internet. It's the security guard at the gate. You need one of these to prevent hackers from using the internet to break in and steal sensitive information from your company. back to top |
||||||||||||||||||||||||||||||||||
Frames A way of splitting up a web page so that each opened box can operate independently. back to top |
||||||||||||||||||||||||||||||||||
FTP (File Transfer Protocol) A very common method of moving files between two Internet sites. FTP is a way to login to another Internet site for the purposes of retrieving and/or sending files. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP, by logging in using the account name "anonymous", thus these sites are called "anonymous ftp servers". FTP was invented and in wide use long before the advent of the World Wide Web and originally was always used from a text-only interface. back to top |
||||||||||||||||||||||||||||||||||
The technical meaning is a hardware or software set-up that translates between two dissimilar protocols, for example America Online has a gateway that translates between its internal, proprietary e-mail format and Internet e-mail format. Another, sloppier meaning of gateway is to describe any mechanism for providing access to another system, e.g. AOL might be called a gateway to the Internet. back to top |
||||||||||||||||||||||||||||||||||
GIF (Graphic Interchange Format) A common format for image files, especially suitable for images containing large areas of the same color. GIF format files of simple images are often smaller than the same file would be if stored in JPEG format, but GIF format does not store photographic images as well as JPEG back to top |
||||||||||||||||||||||||||||||||||
Gigabyte |
||||||||||||||||||||||||||||||||||
As used in reference to the World Wide Web, "hit” means a single request from a web browser for a single item from a web server; thus in order for a web browser to display a page that contains 3 graphics, 4 “hits” would occur at the server: 1 for the HTML page, and one for each of the 3 graphics. back to top |
||||||||||||||||||||||||||||||||||
Home Page (or Homepage) Several meanings. Originally, the web page that your browser is set to use when it starts up. The more common meaning refers to the main web page for a business, organization, person or simply the main page out of a collection of web pages, e.g. "Check out so-and-so's new Home Page." back to top |
||||||||||||||||||||||||||||||||||
Host Any computer on a network that is a repository for services available to other computers on the network. It is quite common to have one host machine provide several services, such as SMTP (email) and HTTP (web). back to top |
||||||||||||||||||||||||||||||||||
Hosting: Secure Our Servers offer SSL (Secure Sockets Layer) encryption for your website when using one of our secure servers. To save you the time and hassle of registering your own secure certificates we have registered the certficates under the safeserver.co.uk and safehosting.net domain names. This service is available to all customers and is compatible with CGI/PHP as our domains are run on a Linux server. In order to access your webpages under SSL you will need to use the secure server prefix we provide you after signing up for this service. eg https://www.safeserver.co.uk/domain/ or https://www.safehosting.net/domain/ Where www.domain.com is your domain name. This will display a padlock in the corner of your browser indicating the pages are being displayed under SSL encryption. Depending on browser setup this may also display the security alert " You are about to view pages over a secure connection Any information you exchange within this site cannot be viewed by anyone else on the web" back to top |
||||||||||||||||||||||||||||||||||
HTML (HyperText Markup Language) The coding language used to create Hypertext documents for use on the World Wide Web. HTML looks a lot like old-fashioned typesetting code, where you surround a block of text with codes that indicate how it should appear. The "hyper" in Hypertext comes from the fact that in HTML you can specify that a block of text, or an image, is linked to another file on the Internet. HTML files are meant to be viewed using a "Web Browser". back to top |
||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Hyperlink In World Wide Web pages, hyperlinks are highlighted text or images which, when selected (usually by clicking the mouse button), follow a link to another page. Hyperlinks can also be used to automatically download other files as well as sounds and video clips. back to top |
||||||||||||||||||||||||||||||||||
Hypertext |
||||||||||||||||||||||||||||||||||
IMAP is gradually replacing POP as the main protocol used by email clients in communicating with email servers. Using IMAP an email client program can not only retrieve email but can also manipulate message stored on the server, without having to actually retrieve the messages. So messages can be deleted, have their status changed, multiple mail boxes can be managed, etc. back to top |
||||||||||||||||||||||||||||||||||
Intranet A private network that uses the same technology as the web, but is restricted to company use. All the benefits of the web inside your business. back to top |
||||||||||||||||||||||||||||||||||
IP (internet protocol) The method for moving information from one network to another on the internet. An IP address uniquely identifies every site on the internet. Every website has an IP address associated with it. back to top |
||||||||||||||||||||||||||||||||||
ISDN Stands for Integrated Services Digital Network and provides dial-up services at up to twice the speed of standard telephone connections. ISDN has provided a fast-access option in the run up to broadband over the past few years, but is now expensive and difficult to use by current ADSL standards. back to top |
||||||||||||||||||||||||||||||||||
ISP Internet Service Provider, a company that uses one or more servers to give you access to the web. The best ISPs offer much more than this - including web site design, web hosting and technical support. www.webperf.net is the place to go to see the best performing ISP's in the country. back to top |
||||||||||||||||||||||||||||||||||
Java is a network-friendly programming language invented by Sun Microsystems. Java is often used to build large, complex systems that involve several different computers interacting across networks, for example transaction processing systems. Java is also becoming popular for creating programs that run in small electronic devicws, such as mobile telephones. A very common use of Java is to create programs that can be safely downloaded to your computer through the Internet and immediately run without fear of viruses or other harm to your computer or files. Using small Java programs (called "Applets"), Web pages can include functions such as animations,calculators, and other fancy tricks. |
||||||||||||||||||||||||||||||||||
JavaScript JavaScript is a programming language that is mostly used in web pages, usually to add features that make the web page more interactive. When JavaScript is included in an HTML file it relies upon the browser to interpret the JavaScript. When JavaScript is combined with Cascading Style Sheets(CSS), and later versions of HTML (4.0 and later) the result is often called DHTML. back to top |
||||||||||||||||||||||||||||||||||
JPEG (Joint Photographic Experts Group) |
||||||||||||||||||||||||||||||||||
Just over a thousand bits or bytes (It's a "you say potato" kinda thing). A 56Kbit/s modem runs at a maximum speed of 57,344 bits a second. A 5Kb file contains more than 5,000 bytes of information. You can also have megabits/bytes (more than a million), gigabits/bytes (more than 100 million) and terabits/bytes (more than 1,000 million). An ADSL modem can process up to 2 million bits per second back to top |
||||||||||||||||||||||||||||||||||
LAN (Local Area Network) |
||||||||||||||||||||||||||||||||||
Leased Line Refers to line such as a telephone line or fiber-optic cable that is rented for exclusive 24-hour, 7-days-a-week use from your location to another location. The highest speed data connections require a leased line. back to top |
||||||||||||||||||||||||||||||||||
Linux |
||||||||||||||||||||||||||||||||||
Mb (megabits) |
||||||||||||||||||||||||||||||||||
Mbps (megabits per second) The amount of information that can be transmitted per second measured in megabits, i.e., 2mbps = transmission of over two million bits of information per second. back to top |
||||||||||||||||||||||||||||||||||
Megabyte A million bytes. Actually, technically, 1024 kilobytes. back to top |
||||||||||||||||||||||||||||||||||
Meta Tag You can see the Meta tags in a page if you view the pages' source code. |
||||||||||||||||||||||||||||||||||
Mirror |
||||||||||||||||||||||||||||||||||
Modem (MOdulator, DEModulator) A device that connects a computer to a phone line. A telephone for a computer. A modem allows a computer to talk to other computers through the phone system. Basically, modems do for computers what a telephone does for humans. back to top |
||||||||||||||||||||||||||||||||||
MYSQL DATABASE |
||||||||||||||||||||||||||||||||||
A WWW Browser and the name of a company. The Netscape (tm) browser was originally based on the Mosaic program developed at the National Center for Supercomputing Applications (NCSA). back to top |
||||||||||||||||||||||||||||||||||
NIC (Network Information Center) |
||||||||||||||||||||||||||||||||||
back to top |
||||||||||||||||||||||||||||||||||
Information moves around the Internet in 'packets'; chunks of data each with their own destination address. Think of packets as sealed envelopes containing data, with addresses written on them. They all go through the system, and usually end up at the correct destination. The more envelopes the system must handle, the slower the process becomes. back to top |
||||||||||||||||||||||||||||||||||
Packet Switching The method used to move data around on the Internet. In packet switching,all the data coming out of a machine is broken up into chunks, each chunk has the address of where it came from and where it is going. This enables chunks of data from many different sources to co-mingle on the same lines, and be sorted and directed along different routes by special machines along the way. This way many people can use the same lines at the same time. You might think of several caravans of trucks all using the same road system. to carry materials back to top |
||||||||||||||||||||||||||||||||||
Password A code used to gain access (login) to a locked system. Good passwords contain letters and non-letters and are not simple combinations such as virtue7. back to top |
||||||||||||||||||||||||||||||||||
Ping To check if a server is running. From the sound that a sonar systems makes in movies, you know, when they are searching for a submarine. back to top |
||||||||||||||||||||||||||||||||||
PGP PGP Mail encrypts email, files, and instant messages and also provides the ability to manage PGP keys. This can be used to encrypt emails containing credit card details when sending over the net. PGP credit card forms can be used as an alternative (and reletively cheaper) to having a fully blown eccommerce website where you require additional things from you bank (Merchant Number). back to top |
||||||||||||||||||||||||||||||||||
What is PGP? How does PGP work? |
||||||||||||||||||||||||||||||||||
Plug-in A (usually small) piece of software that adds features to a larger piece of software. Common examples are plug-ins for the Netscape® browser and web server. Adobe Photoshop® also uses plug-ins. back to top |
||||||||||||||||||||||||||||||||||
POP |
||||||||||||||||||||||||||||||||||
back to top |
||||||||||||||||||||||||||||||||||
Raid This is when data is written to one disk and then automatically written simultaneously to one or more other disks, such that if one disk fails the other can carry on serving content with no loss of service. back to top |
||||||||||||||||||||||||||||||||||
Router Routers are traffic cop computers on Internet backbones responsible for redirecting data from sender to receiver. When major routers slow down or stop, it has an adverse affect on Internet data flow in that region. back to top |
||||||||||||||||||||||||||||||||||
Search Engine |
||||||||||||||||||||||||||||||||||
Secure Hosting (SEE HOSTING) back to top |
||||||||||||||||||||||||||||||||||
Security Certificate |
||||||||||||||||||||||||||||||||||
SEO (Search Engine Optimization) The practice of designing web pages so that they rank as high as possible in search results from search engines. There is "good" SEO and "bad" SEO. Good SEO involves making the web page clearly describe its subject, making sure it contains truly useful information, including accurate information in Meta tags, and arranging for other web sites to make links to the page. Bad SEO involves attempting to deceive people into believing the page is more relevant than it truly is by doing things like adding inaccurate Meta tags to the page. |
||||||||||||||||||||||||||||||||||
Server Sometimes server software is designed so that additional capabilities can be added to the main program by adding small programs known as servlets. |
||||||||||||||||||||||||||||||||||
Servlet A small computer program designed to be add capabilities to a larger piece of server software. Common examples are "Java servlets", which are small programs written in the Java language and which are added to a web server. Typically a web server that uses Java servlets will have many of them, each one designed to handle a very specific situation, for example one servlet will handle adding items to a "shopping cart", while a different servlet will handle deleting items from the "shopping cart." back to top |
||||||||||||||||||||||||||||||||||
Service Level Agreement The agreement between Zest! Media and a customer that sets out what services will be delivered, how problems will be resolved and services maintained. back to top |
||||||||||||||||||||||||||||||||||
SMTP (Simple Mail Transfer Protocol) The main protocol used to send electronic mail from server to server on the Internet. SMTP is defined in RFC 821 and modified by many later RFC's. back to top |
||||||||||||||||||||||||||||||||||
Spam (or Spamming) An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn?t ask for it. The term probably comes from a famous Monty Python skit which featured the word spam repeated over and over. The term may also have come from someone?s low opinion of the food product with the same name, which is generally perceived as a generic content-free waste of resources. (Spam® is a registered trademark of Hormel Corporation, for its processed meat product.) back to top |
||||||||||||||||||||||||||||||||||
SQL (Structured Query Language) A specialized language for sending queries to databases. Most industrial-strength and many smaller database applications can be addressed using SQL. back to top |
||||||||||||||||||||||||||||||||||
SSL Certificates: Geotrust If you’re looking for end-to-end Internet security coverage, True BusinessID from GeoTrust is the answer. - Identity verification Smart Seal - embedded company name/date/time stamp - Compatible with 98% of all browsers - Full 128-bit encryption technology This bundled package of SSL and True Site delivers unsurpassed browser and server recognition as well as airtight access protection and fraud prevention. The most secure encryption technology you can buy. True BusinessID is the only next generation web trust service that combines state-of-the-art 128-bit SSL encryption and identity verification in a single bundle. That means a new level of online security for both you and your customers, and a corresponding increase in business activity and revenue generated by your web site. Getting started with True BusinessID is hassle-free. We’ll provide easy-to-follow online installation instructions so you can put True BusinessID to work right away. We will even notify you of renewal requirements in advance so you can be sure that your True BusinessID is always operating at optimal levels – seamless protection for your online business, and important 24x7 assurance for your customers. back to top |
||||||||||||||||||||||||||||||||||
SSL Certificates: Thawte What is a SSL Web Server Certificate? With a Thawte SSL Web Server Certificate on your website, any information sent to your web server is encrypted or scrambled, making it impossible to intercept or steal. It also displays the identity of the website owner, and the name of the independent authority who verified that identity, such as Thawte. The Thawte Web Server Certificate connects at 128 bit, 56 bit or 40 bit depending on the client's browser capability.A SSL Web Server Certificate enables your customers to view the following information:- The domain for which the certificate was issued. This allows them to check that the SSL Web Server Certificate was issued for your domain (URL). - The owner of the certificate. This acts as further reassurance, since customers are able to see whom they are doing business with. - The physical location of the owner. Once again this reassures customers that they are dealing with an actual entity. - The validity dates of the certificate. This is extremely important, since it shows users that your SSL Web Server Certificate is current. Why do I need a SSL Web Server Certificate? Many online transactions fail at the last minute when consumers consider the potential risks of entering their credit card and other personal information, or when it is not clear whether it is safe to download code from your site. Utilizing Thawte's digital SSL (Secure Sockets Layer) 'handshake', based on the leading security protocol on the Internet, you and your customers can rest assured that all online communications are secure while the information is being transmitted. Securing the transmission of information to your business holds obvious benefits, as does signifying that you are a trustworthy online organization. The tried-and-tested technology of Thawte's SSL Web Server Certificate protects against password and information interception, ensuring that your online relationship with your customers will be one based on trust. What's in it for me? It's all about trust -- by utilizing Thawte's SSL Web Server Certificate you are sending a clear signal to your customers. They know that the information they submit will not be intercepted while in transit, and that you are a verified, real-world organization. Why choose a Thawte Server Certificate? Thawte's certification practices are of the highest standard. We believe that excellent authentication and verification procedures are absolutely essential in order to ensure trust on the Internet. As a truly international organization in the best sense, Thawte takes great pride in its world-beating solutions. back to top |
||||||||||||||||||||||||||||||||||
SQL Database (SEE DATABASES) back to top |
||||||||||||||||||||||||||||||||||
Statistics (SEE WEB STATISTICS) back to top |
||||||||||||||||||||||||||||||||||
This is the suiteof protocols that defines the Internet. Originally designed for the UNIX operating system, TCP/IP software is now included with every major kind of computer operating system. To be truly on the Internet, your computer must have TCP/IP software. back to top |
||||||||||||||||||||||||||||||||||
Terabyte 1000 gigabytes back to top |
||||||||||||||||||||||||||||||||||
TLD (Top Level Domain) The last (right-hand) part of a complete Domain Name. For example in the domain name www.matisse.net ".net" is the Top Level Domain. There are a large number of TLD's, for example .biz, .com, .edu, .gov, .info, .int, .mil, .net, .org, and a collection of two-letter TLD's corresponding to the standard two-letter country codes, for example, .us, .ca, .jp, etc. back to top |
||||||||||||||||||||||||||||||||||
Trojan Horse |
||||||||||||||||||||||||||||||||||
A computer operating system (the basic software running on a computer, underneath things like word processors and spreadsheets). Unix is designed to be used by many people at the same time (it is multi-user) and has TCP/IP built-in. It is the most common operating system for servers on the Internet. Apple computers' Macintosh operating system, as of version 10 ("Mac OS X"), is based on Unix. back to top |
||||||||||||||||||||||||||||||||||
URL (Uniform Resource Locator) |
||||||||||||||||||||||||||||||||||
A chunk of computer programming code that makes copies of itself without any concious human intervention. Some viruses do more than simply replicate themselves, they might display messages, install other software or files, delete software of files, etc. A virus requires the presence of some other program to replicate itself. Typically viruses spread by attaching themselves to programs and in some cases files, for example the file formats for Microsoft word processor and spreadsheet programs allow the inclusion of programs called "macros" which can in some cases be a breeding ground for viruses. back to top |
||||||||||||||||||||||||||||||||||
VPN (Virtual Private Network) A method of sending data securely across a public network. back to top |
||||||||||||||||||||||||||||||||||
Web Forwarding will automatically redirect any visitors to your domain to the specified website. This is useful if, for example, your website is hosted with a free hosting provider, but you wish to have some of the benefits of your own domain name without the hosting costs. There are 2 types of Web Forwarding, Cloaked and Un-Cloaked. The are clear advantages and dis-advantages to these services. back to top |
||||||||||||||||||||||||||||||||||
Web Forwarding: Cloaked The advantage of this service is that the URL is preserved. Using the above example, 'www.yourdomain.com' would still redirect to the other site, but the URL in the browser will stay as 'www.yourdomain.com', hiding the fact that the website is hosted elsewhere. back to top |
||||||||||||||||||||||||||||||||||
Web Forwarding: Un-Cloaked The disadvantage of the basic service is that the URL will change. For example, if you redirected 'www.yourdomain.com' to 'http://www.freesites.com/~yourdomain/' then the first URL would be replaced with the second when the browser is redirected. back to top |
||||||||||||||||||||||||||||||||||
WAN (Wide Area Network) Wide area networks connect sites around the country or the world. A metropolitan area network (MAN) links sites around a city or large university. back to top |
||||||||||||||||||||||||||||||||||
Web Caching Web caching is a way of storing web pages so that they can be accessed at will without having to go the original source each time. Pages are stored 'higher up the chain' and become 'locally available'. back to top |
||||||||||||||||||||||||||||||||||
Web Mail Unlike email, where you access mail via a program like Outlook Express, web mail services such as Hotmail or Freeserve allow to receive and send mail from anywhere in the world. A Zest! Media webmail facility is included free of charge with every email account. back to top |
||||||||||||||||||||||||||||||||||
Webopedia A website dedicated to explaining the terms used in the Internet industry - found here back to top |
||||||||||||||||||||||||||||||||||
Web Statistics: Webalizer Webalizer is a web server log file analysis program which produces usage statistics in HTML format for viewing with a browser. The results are presented in both columnar and graphical format, which facilitates interpretation. Yearly, monthly, daily and hourly usage statistics are presented, along with the ability to display usage by site, URL, referrer, user agent (browser), username, search strings, entry/exit pages, and country. back to top |
||||||||||||||||||||||||||||||||||
Worm A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs. back to top |
||||||||||||||||||||||||||||||||||
back to top |
||||||||||||||||||||||||||||||||||
back to top |
||||||||||||||||||||||||||||||||||