Browse Definitions :
Definition

com

On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name. It generally describes the entity owning the domain name as a commercial organization. Along with the second-level domain name (for example: "whatis" in whatis.com), the top-level domain name is required in Web and e-mail addresses.

The Internet Corporation for Assigned Names and Numbers (ICANN) has overall responsibility for domain names (as well as for Internet Protocol addresses and many other Internet parameters). Day-to-day responsibility is delegated to specific registrars, such as Network Solutions and a number of competing companies for .com, .org, .net, and .edu top-level domains.

Specific criteria are set forth for the use of the top-level domain name in RFC 1591 - Domain Name System Structure and Delegation.

The top-level domain names administered by ICANN and its delegate agencies are: com, edu, gov, int, mil, net, and org. In addition to these, domain name applicants within the United States may also be able to register a name under a U.S. top-level domain name based on geography. See RFC 1480 - The US Domain and visit the U.S. Domain Registry for registration procedures.

Top-level domain names for countries other than the United States are administered by each country and are based on the ISO-3166 list of country codes.

This was last updated in September 2005

Continue Reading About com

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close