Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

136 - EVI

  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 404 (status code) - 404 is a frequently-seen status code that tells a Web user that a requested page is "Not found.
  • 404 error page - A 404 page is the webpage served to a user who tries to access a page that is unavailable.
  • 80 - If you occasionally see a mysterious "80" on the name of a Web server that is handling your request for Web pages, this is a bit of technical stuff showing through when perhaps it shouldn't.
  • AAAA resource record - An AAAA resource record is a record that stores a single IPv6 address.
  • above the fold - Above the fold, as it applies to Web design, is the portion of a Web page that is visible in a browser window when the page first loads.
  • acceptable use policy (AUP) - An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet.
  • Address Resolution Protocol (ARP) - Address Resolution Protocol (ARP) is a procedure for mapping a dynamic Internet Protocol address (IP address) to a permanent physical machine address in a local area network (LAN).
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • adware - Adware is any software application in which advertising banners are displayed while a program is running.
  • AI winter - AI winter is a quiet period for artificial intelligence research and development.
  • Alphanumerish - Alphanumerish is a term coined to define the shorthand typing language that has developed from computer users' habit of substituting numerals for letters and substituting both letters and numerals for words or word parts.
  • anonymous FTP (File Transfer Protocol) - Using the Internet's File Transfer Protocol (FTP), anonymous FTP is a method for giving users access to files so that they don't need to identify themselves to the server.
  • ASMR (autonomous sensory meridian response) - Autonomic sensory meridian response (ASMR) is a tingling sensation that some people experience when exposed to particular types of auditory or visual stimuli such as whispering, tapping and slow movements.
  • autofill - Autofill is a feature in software programs and applications that automatically inserts previously-entered information for the user’s convenience.
  • avatar - In a UNIX environment, an avatar is special user who is given the authority to access all file directories and files under the root directory.
  • B2C (Business2Consumer or Business-to-Consumer) - B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has purchased the goods or service for personal use.
  • bacn - Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away.
  • bad neighborhood - A bad neighborhood, in an SEO context, is a group of linked websites with poor reputations and search rankings.
  • banner - Depending on how it's used, a banner is either a graphic image that announces the name or identity of a site (and often is spread across the width of the Web page) or is an advertising image.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • Big Mother - Big Mother is the concept of pervasive parenting, in which parents use modern geolocation, wireless and video technologies to constantly track the activities of a child.
  • black box (black box testing) - Black box testing assesses a system solely from the outside, without the operator or tester knowing what is happening within the system to generate responses to test actions.
  • black hat - Black hat refers to a hacker who breaks into a computer system or network with malicious intent.
  • blog (weblog) - A blog (short for weblog) is a personal online journal that is frequently updated and intended for general public consumption.
  • blogroll - A blogroll is a list of blogs, usually placed in the sidebar of a blog, that reads as a list of recommendations by the blogger of other blogs.
  • BOPIS (buy online, pick up in-store) - BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up their purchases in the brick-and-mortar store, often within the same day.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • bounce rate - Bounce rate is the percentage of visitors to a given website that leave the site after viewing only a single page.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • brochureware - Brochureware refers to Web sites or pages that are produced by taking an organization's printed brochure and translating it directly to the Web without regard for the possibilities of the new medium.
  • Bump - Bump is a free software program (app) that allows two phones to transfer contact information when the phone owners "bump" hands.
  • Burning Man - Burning Man is an annual week-long experiment in temporary community.
  • CamelCase - CamelCase is a naming convention in which a name is formed of multiple words that are joined together as a single word with the first letter of each of the multiple words capitalized so that each word that makes up the name can easily be read.
  • catfish - A catfish is someone who creates a false identity online to deceive victims, often as a means of attracting romantic interest.
  • CERN (Conseil Europeen pour la Recherche Nucleaire) - CERN is a high-energy particle physics organization headquartered in Geneva, Switzerland.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • chatting - For terms frequently used in online keyboard chatting, see chat acronyms/IRC/BBS.
  • chatty protocol - A chatty protocol is an application or routing protocol that requires a client or server to wait for an acknowledgement before it can transmit again.
  • click farm - A click farm is a business that pays employees to click on website elements to artificially boost the status of a client's website or a product.
  • click fraud (pay-per-click fraud) - Click fraud (sometimes called pay-per-click fraud) is the practice of artificially inflating traffic statistics for online advertisements.
  • click rate - In Web advertising, the click rate is the number of clicks on an ad on an HTML page as a percentage of the number of times that the ad was downloaded with a page.
  • click stream - In Web advertising, a click stream is the sequence of clicks or pages requested as a visitor explores a Web site.
  • clickwrap agreement (clickthrough agreement) - A clickwrap agreement, also known as a click through, shrink-wrap, or sign-in-wrap, is an online agreement in which the user signifies his or her acceptance by clicking a button or checking a box that states “I agree.
  • computer exploit - A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders.
  • corportal (Corporate Portal) - Corportal is short for "corporate portal.
  • CPE device - A CPE device is telecommunications hardware located at the home or business of a customer.
  • crapware - Definition - What is crapware?Crapware is an unflattering name for unwanted software or software that doesn't perform as expected.
  • crowdfunding - Crowdfunding is a financing method that involves soliciting relatively modest contributions from a group of individuals.
  • crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • cruft - Cruft is the elements of a program, system or product that are either useless, poorly designed or both.
  • Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • cyberspace - Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
  • cyberstalking - Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.
  • cyberterrorism - According to the U.
  • cyborg anthropologist - A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
  • dark mode - Dark mode is a color scheme change for user interfaces (UI) on webpages, apps and programs that displays light text on a dark background for easier viewing.
  • dark web (darknet) - The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines and requires specific configuration or authorization to access.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • Digg - Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like.
  • digital citizenship - Digital citizenship is the online presence, behaviors and response to others within a digital community where one is a member.
  • digital divide - The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital footprint management (DFM) - Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them.
  • digital self-harm - Digital self-harm is targeting oneself with negative content online.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital wellbeing - Digital wellbeing is a term used by health professionals, researchers and device manufacturers to describe the concept that when humans interact with technology, the experience should support mental and/or physical health in a measurable way.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • dot address - Tip:To find out the dot address (such as 205.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • e-form (electronic form) - An e-form (electronic form) is a computer program version of a paper form.
  • e-paper (radio paper or electronic paper) - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • e-procurement (supplier exchange) - Electronic procurement, also known as e-procurement or supplier exchange, is the process of requisitioning, ordering and purchasing goods and services online.
  • eBook - An eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader.
  • electronic ink - Electronic ink is a liquid substance, in development at MIT's Media Lab in partnership with a company called E Ink, that responds to electrical impulses to enable changeable text and image displays on a flexible surface.
  • electronic resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • Evernet - The term Evernet has been used to describe the convergence of wireless, broadband, and Internet telephony technologies that will result in the ability to be continuously connected to the Web anywhere using virtually any information device.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close