Page 98 - Life In Naples Magazine - November 2015
P. 98

naples mac help

         Useful
Technology Terms

I t is easy to misinterpret some of the tech terms floating around web                   DOWNLOAD
    these days -- but now more than ever, everyone needs to be familiar
    with this terminology as it becomes more useful when reading and                       Downloading is a broad term that describes when you
talking about technology!                                                                  make a personal copy of something you find on the
                                                                             Internet or World Wide Web. Commonly, downloading is associated
                   BLOG                                                      with songs, music, and software files (e.g. “I want to download a new
                                                                             musical ringtone for my cell phone”, or ”I want to download the new
                     I am often asked about how to change an email           version of iTunes”). The larger the file you are copying, the longer the
                     address. Short for weblog, a blog is a regularly        download may take to transfer to your computer.
                     updated website or web page, typically one run by
                     an individual or small group, that is written in an                       HTML
informal or conversational style. Blogs are defined by their format: a
series of entries posted to a single page, usually in reverse-chronological                       “Hyper-text markup language.” The language used
order. Blogs generally represent the personality of the author or reflect                         to direct the architecture of any website, landing
the purpose of the Web site that hosts the blog. Topics sometimes                                 pages, and emails. HTML lays out the structure of
include brief philosophical musings,commentary on Internet and other         a website, from the title and first header, to a bulleted list, to the footer.
social issues, and links to other sites the author favors, especially those
that support a point being made on a post.                                                     IP ADDRESS

            BOOKMARK                                                                              “Internet Protocol address.” A numerical label
                                                                                                  assigned to each device participating in a computer
              A bookmark (or a “favorite”) is a placeholder that you                              network that uses the Internet Protocol for
              can use for web pages. You would bookmark something                                 communication.
              because:
1. You want to return to the page or file later                                            ISP
2. You want to recommend the page or file to someone else
Bookmarks/Favorites can be made using your right mouse click menu,                           “Internet service provider.”An organization (commercial,
or using the menus/toolbars at the top of your web browser.Bookmarks/                        community-owned, nonprofit, or otherwise privately
Favorites can also be made on your Mac or Windows computer files.                            owned) that provides internet services.

COOKIES                                                                      MALWARE

Cookies can be used for many things, but the simplest case is just           Malware is a term for any software that gets installed on your machine
remembering who you are. A cookie is nothing more than some                  and performs unwanted tasks, often for some third party’s benefit.
information a website can save on your computer that your browser            Malware programs can range from being simple annoyances (pop-
provides back to that same website the next time you return. Ever made       up advertising) to causing serious computer invasion and damage
a return visit to a website like Amazon and seen content tailored to         (e.g., stealing passwords and data or infecting other machines on
your user preferences? That’s because on your first visit, a cookie was      the network). Additionally, some malware programs are designed to
installed.When you came back, the website server read your cookie and        transmit information about your Web-browsing habits to advertisers or
recognized you.                                                              other third party interests, unbeknownst to you.

              DNS                                                                             PHISHING

                “Domain name server.” Servers that translates web                               Phishing is very much like fishing, except that you’re
                addresses into one or more IP addresses.This is why you                         the fish, and that threatening email is the bait. If you
                can enter Google.com instead of having to remember                              bite, you run the very real risk of account or identity
that the IP address is 74.125.224.72.                                        theft and all the hassle that entails. Phishing is, essentially, an email
                                                                             message that tries to trick you into taking some action by fooling you

	98 											                                                              Life in Naples | November 2015
   93   94   95   96   97   98   99   100   101   102   103