Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

136 - ELE

  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 404 (status code) - 404 is a frequently-seen status code that tells a Web user that a requested page is "Not found.
  • 404 error page - A 404 page is the webpage served to a user who tries to access a page that is unavailable.
  • 80 - If you occasionally see a mysterious "80" on the name of a Web server that is handling your request for Web pages, this is a bit of technical stuff showing through when perhaps it shouldn't.
  • AAAA resource record - An AAAA resource record is a record that stores a single IPv6 address.
  • above the fold - Above the fold, as it applies to Web design, is the portion of a Web page that is visible in a browser window when the page first loads.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet Protocol address (IP address) to a permanent physical machine address in a local area network (LAN).
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • adware - Adware is any software application in which advertising banners are displayed while a program is running.
  • AI winter - AI winter is a quiet period for artificial intelligence research and development.
  • Alphanumerish - Alphanumerish is a term coined to define the shorthand typing language that has developed from computer users' habit of substituting numerals for letters and substituting both letters and numerals for words or word parts.
  • anonymous FTP (File Transfer Protocol) - Using the Internet's File Transfer Protocol (FTP), anonymous FTP is a method for giving users access to files so that they don't need to identify themselves to the server.
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • avatar - In a UNIX environment, an avatar is special user who is given the authority to access all file directories and files under the root directory.
  • B2C (Business2Consumer or Business-to-Consumer) - B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has purchased the goods or service for personal use.
  • bacn - Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away.
  • bad neighborhood - A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.
  • banner - Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • Big Mother - Big Mother is the concept of pervasive parenting, in which parents use modern geolocation, wireless and video technologies to constantly track the activities of a child.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black hat - Black hat refers to a hacker who breaks into a computer system or network with malicious intent.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • Bluejacking - Bluejacking is the practice of sending messages between mobile users using a Bluetooth wireless connection.
  • BOPIS (buy online, pick up in-store) - BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up their purchases in the brick-and-mortar store, often within the same day.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • bounce rate - Bounce rate is the percentage of visitors to a given website that leave the site after viewing only a single page.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • brochureware - Brochureware refers to Web sites or pages that are produced by taking an organization's printed brochure and translating it directly to the Web without regard for the possibilities of the new medium.
  • Bump - Bump is a free software program (app) that allows two phones to transfer contact information when the phone owners "bump" hands.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • CamelCase - CamelCase is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized so that each word that makes up the name can easily be read.
  • catfish - A catfish is someone who creates a false identity online to deceive victims, often as a means of attracting romantic interest.
  • CERN (Conseil Europeen pour la Recherche Nucleaire) - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • chatting - For terms frequently used in online keyboard chatting, see chat acronyms/IRC/BBS.
  • chatty protocol - A chatty protocol is an application or routing protocol that requires a client or server to wait for an acknowledgement before it can transmit again.
  • churn (agitation or turnover) - In a general context, churn is a synonym for agitation or turnover.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click stream - In Web advertising, a click stream is the sequence of clicks or pages requested as a visitor explores a Web site.
  • clicks and mortar - Clicks and mortar, sometimes seen as clicks-and-mortar or clicks and bricks, is a type of omnichannel business model that takes advantage of both online and offline operations.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • corportal (Corporate Portal) - Corportal is short for "corporate portal.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • crapware - Definition - What is crapware?Crapware is an unflattering name for unwanted software or software that doesn't perform as expected.
  • cross-sell - Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.
  • crowdfunding - Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals.
  • crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
  • Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • cyberspace - Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
  • cyberstalking - Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • cyberterrorism - According to the U.
  • cyborg anthropologist - A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
  • dark mode - Dark mode is a color scheme change for user interfaces (UI) on webpages, apps and programs that displays light text on a dark background for easier viewing.
  • dark web (darknet) - The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines and requires specific configuration or authorization to access.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • Digg - Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital divide - The term 'digital divide' describes the fact that the world can be divided into people who do and people who don't have access to - and the capability to use - modern information technology, such as the telephone, television, or the Internet.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital footprint management (DFM) - Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital wellbeing - Digital wellbeing is a term used by health professionals, researchers and device manufacturers to describe the concept that when humans interact with technology, the experience should support mental and/or physical health in a measurable way.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • dot address - Tip:To find out the dot address (such as 205.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • e-form (electronic form) - An e-form (electronic form) is a computer program version of a paper form.
  • e-paper (radio paper or electronic paper) - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • e-procurement (supplier exchange) - E-procurement is the business-to-business purchase and sale of supplies and services over the Internet.
  • eBook - An eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close