Computer and Internet Terminology
Definitions and Explanations
Hacker: A person with technical expertise who experiments with computer systems to determine how to develop additional features. Hackers are occasionally requested by system administrators to try and “break into” systems via a network to test security. The term hacker is sometimes incorrectly used interchangeably with cracker. A hacker is called a “white hat” and a cracker a “black hat.”
Help Desk Technician: Helps end-users with their computer problems in person, by e-mail, or over the phone.
HTML: HyperText Markup Language. The language used to create World Wide Web pages, with hyperlinks and markup for text formatting (different heading styles, bold, italic, numbered lists, insertion of images, etc.).
Hub: A central device that connects several computers together or several networks together.
Hyperlink: Text or an image that is connected by hypertext coding to a different location. By selecting the text or image with a mouse, the computer “jumps to” the linked location.
Icons: A small picture that represents an object or program. WIMP stands for Windows, Icons, Mouse, Pull-down Menus. A WIMP interface is a graphical user interface such as used in Macintosh, Microsoft Windows, OSF/Motif, NeWS, RISC OS, and the X Window System.
Java: A language which brings animation and interaction to the Web.
Level Designer: Level or environment designer is the person responsible for creating the game environment, levels, and missions.
Locked Padlock: Symbol on your browser that shows a site has security protection.
Modem: A device that connects two computers together over a telephone or cable line by converting the computer’s data into an audio signal. Modem is a contraction for the process it performs: modulate-demodulate.
Network Administrator: Person that manages the hardware and software that comprise a network.
Newbies: New participants in discussion forums.
Node: A point on a computer network where a message can be created or received.
Octal (notation): Refers to the base-8 number system, which uses just eight unique symbols (0, 1, 2, 3, 4, 5, 6, and 7). Programs often display data in octal format because it is relatively easy for humans to read and can easily be translated into binary format, which is the most important format for computers.
OLE: Microsoft’s object linking and embedding standard.
Palmtop: A hand-held computer which is used as PC companion.
PDA: Personal Digital Assistant. A hand-held computer that can store daily appointments, phone numbers, addresses, and other important information. Most PDAs link to a desktop or laptop computer to download or upload information.
Phishing: Making a fake website to steal credit card information.
PHP: An open source, server-side, HTML embedded scripting language used to create dynamic Web pages.
Platform Game: A game that involves traveling and jumping across platforms, often with obstacles and other elements like ladders.
Protocol: Specification that describes how computers will talk to each other on a network.
Proxy: A server that controls the traffic between the Internet and a private network.
Racing Game: A game in which the player races against opponents in some type of transportation.
Role-Playing Game: A game in which the player controls a central character. They explore the game world, solve puzzles and take part in tactical fights to complete it.