Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

CYB - HAI

  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • cyberprise - A cyberprise is a Web-enabled enterprise.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • cyberspace - Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
  • cybersquatting - Cybersquatting is registering, trafficking in, or using a domain name with bad-faith intent to profit from the goodwill of a trademark belonging to someone else.
  • cyberstalking - Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • cyberterrorism - According to the U.
  • cyberwoozling - According to Content Technologies (formerly called Integralis), makers of MIMEsweeper, cyberwoozling is the practice of gathering data from a Web user's PC when the user visits a Web site.
  • cyborg anthropologist - A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
  • cybrarian - A cybrarian (pronounced sai-BREHR-i-uhn, a compound of cyber and librarian) is a library and information science professional that specializes in using the Internet as a resource tool.
  • cypherpunk - Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy.
  • dark mode - Dark mode is a color scheme change for user interfaces (UI) on webpages, apps and programs that displays light text on a dark background for easier viewing.
  • dark web (darknet) - The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines and requires specific configuration or authorization to access.
  • DARPANET - DARPANET (or DARPANet) is a term sometimes used for the ARPANET, the early network from which today's Internet evolved.
  • dashboard - In information technology, a dashboard is a user interface that, somewhat resembling an automobile's dashboard, organizes and presents information in a way that is easy to read.
  • dead body spam (corpse graffiti) - Dead body spam, also known as corpse graffiti, is a message in a video game that's spelled out with dead characters.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • deep link - A deep link is a hypertext link to a page on a Web site other than its home page.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • Digg - Digg is a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like.
  • digital divide - The term 'digital divide' describes the fact that the world can be divided into people who do and people who don't have access to - and the capability to use - modern information technology, such as the telephone, television, or the Internet.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital footprint - A digital footprint, sometimes called a digital dossier, is the body of data that exists as a result of actions and communications online that can in some way be traced back to an individual.
  • digital footprint management (DFM) - Digital footprint management (DFM) is an approach to controlling the amount and types of electronic data existing about a particular individual that can in some way be traced back to them.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digital wellbeing - Digital wellbeing is a term used by health professionals, researchers and device manufacturers to describe the concept that when humans interact with technology, the experience should support mental and/or physical health in a measurable way.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • domain kiting - Domain kiting is the practice of repeatedly registering and deleting a domain name so that the registrant can, in effect, own the domain name without paying for it.
  • domain sniper - A domain sniper is a person or company that locates and registers a Web site domain name that has lapsed from registration in the expectation that the original registrant will be willing to buy the name back.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • dot address - Tip:To find out the dot address (such as 205.
  • dot-com bubble - The dot-com bubble, also referred to as the Internet bubble, refers to the period between 1995 and 2000 when investors pumped money into Internet-based startups in the hopes that these fledgling companies would soon turn a profit.
  • drive-by download - A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • droupie (data groupie) - Droupie (for data groupie) is computer jargon for someone who likes to spend time with people who are more computer literate than they are.
  • dumpster diving - Dumpster diving is looking for treasure in someone else's trash.
  • e- - e- or E- (sometimes without the hyphen) is a prefix that has spread from e-mail to other forms of human enterprise as they emerge on the Internet.
  • e-form (electronic form) - An e-form (electronic form) is a computer program version of a paper form.
  • e-mail rage - E-mail rage is the online equivalent of "road rage" - in fact, the new social disorder is sometimes referred to as "road rage on the information superhighway.
  • e-outsourcing - For a business, e-outsourcing is buying information technology products and services that could be furnished in-house from one or a variety of sources on the Internet.
  • e-paper (radio paper or electronic paper) - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • e-procurement (supplier exchange) - E-procurement is the business-to-business purchase and sale of supplies and services over the Internet.
  • e-services (electronic services) - E-services, a business concept developed by Hewlett Packard (HP), is the idea that the World Wide Web is moving beyond e-business and e-commerce (that is, completing sales on the Web) into a new phase where many business services can be provided for a business or consumer using the Web.
  • e-tailware - E-tailware is software for creating online catalogs, ordering forms, credit checking, and similar services for Web sites that sell goods and services to consumers.
  • E2E (exchange-to-exchange) - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • eBook - An eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader.
  • edutainment - Edutainment is a neologism (new term coinage), similar to infotainment, that expresses the marriage of education and entertainment in a work or presentation such as a television program or a Web site.
  • egosurfing - Egosurfing is looking to see how many places on the Web your name appears.
  • electronic ink - Electronic ink is a liquid substance, in development at MIT's Media Lab in partnership with a company called E Ink, that responds to electrical impulses to enable changeable text and image displays on a flexible surface.
  • electronic resume - An electronic resume is a plain text (ASCII), PDF or HTML document that provides an employer with information regarding a job candidate's professional experience, education and job qualifications and is meant to be read by a computer program instead of by a human being.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • empirical analysis - Empirical analysis is an evidence-based approach to the study and interpretation of information.
  • end-to-end principle - The end-to-end principle is a network design method in which application-specific features are kept at communication end points.
  • ethical worm - An ethical worm is a program that automates network-based distribution of security patches for known vulnerabilities.
  • evergreen - On the Internet, evergreen is a term used by some ad agencies to describe a Web site that is updated on a daily or other frequent basis.
  • Evernet - The term Evernet has been used to describe the convergence of wireless, broadband, and Internet telephony technologies that will result in the ability to be continuously connected to the Web anywhere using virtually any information device.
  • evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.
  • exomedicine - Exomedicine is the study of medicine related science in earth orbit's micro-gravity.
  • ezine (electronic magazine) - The term ezine is short for "electronic magazine.
  • fabric - In information technology, fabric is a synonym for the words framework or platform.
  • Facebook - Facebook is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues.
  • Facebook "fan" - A Facebook "fan" is a user who "likes" a particular page.
  • Facebook "Like" button - The Facebook "Like" button is a feature that allows users to show their support for specific comments, pictures, wall posts, statuses, or fan pages.
  • Facebook Connect - Facebook Connect is a single sign-on application which allows users to interact on other websites through their Facebook account.
  • Facebook event - A Facebook event is a calendar-based resource which can be used to notify users of upcoming occasions.
  • Facebook group - A Facebook group is a page created for an organization or business to promote activities.
  • Facebook Insights - Facebook Insights is Facebook's version of web page analysis, which allows a user to keep track of information such as page views, unique views, fan statistics, wall posts, video and audio plays, photo views, and so on.
  • Facebook Mobile - Facebook Mobile is a feature that allows a user to access Facebook from their cell phone through text messages, e-mails, downloaded applications or a web browser.
  • Facebook page - A Facebook page is a public profile specifically created for businesses, brands, celebrities, causes, and other organizations.
  • Facebook status - A Facebook status is an update feature which allows users to discuss their thoughts, whereabouts, or important information with their friends.
  • Facebook wall - A Facebook wall is the area on a profile or page where friends and fans can post their thoughts, views, or criticisms for everyone to see.
  • FAQ (frequently-asked questions) - The FAQ (pronounced FAK) or list of "frequently-asked questions" (and answers) has become a feature of the Internet.
  • fast retransmit and recovery (FRR) - In TCP/IP, fast retransmit and recovery (FRR) is a congestion control algorithm that makes it possible to quickly recover lost data packets.
  • favicon (favorite icon) - A favicon (for "favorite icon") is a customized image that Microsoft Internet Explorer 5.
  • feature creep - Feature creep (sometimes known as requirements creep or scope creep) is a tendency for product or project requirements to increase during development beyond those originally foreseen, leading to features that weren't originally planned and resulting risk to product quality or schedule.
  • FileZilla - FileZilla is a free, open source, file transfer protocol (FTP) software tool.
  • first mover - In the business world, a first mover is a company that aims to gain an advantageous and perhaps insurmountable market position by being the first to establish itself in a given market.
  • flamebait - On the Internet, flamebait is a "posting" or note on a Web site discussion forum, an online bulletin board, a Usenet newsgroup, or other public forum that is intended to elicit the extremely strong responses characteristic of flaming and active public discussions.
  • flash mob - A flash mob is a group of strangers who organize themselves, using electronic media such as cell phones or the Internet, to gather together in a public place, behave in a predetermined (and often silly) manner for a predetermined amount of time, and then quickly disperse.
  • flipping the classroom - Flipping the classroom is a teaching method that uses active learning techniques to engage students rather than traditional lectures alone.
  • for your information (FYI) - This term is included in our list of chat term and other chat acronyms.
  • forklift upgrade - Forklift upgrade is industry slang for replacing or significantly upgrading an IT infrastructure.
  • Four Ps - The Four Ps are the four crucial marketing considerations, combined into a list that is known as a marketing mix.
  • fourth wall - The fourth wall is a conceptual barrier between those presenting some kind of a communication and those receiving it.
  • FTP cable (foil screened twisted pair cable) - FTP (foil screened twisted pair) cable is a cable containing multiple pairs of copper wire enclosed in a sheath of aluminum foil.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • FUD (Fear, Uncertainty, and Doubt) - FUD (Fear, Uncertainty, and Doubt) is the term for any strategy intended to make a company's customers insecure about future product plans with the purpose of discouraging them from adopting competitors' products.
  • gamer - A gamer is a devoted player of electronic games, especially on machines especially designed for such games and, in a more recent trend, over the Internet.
  • geek - In computers and the Internet, a geek is a person who is inordinately dedicated to and involved with technology.
  • geek speak - Geek speak is how the uninitiated refer to the jargon and special vocabulary used by those immersed in computers and other fields of information technology.
  • Generation Facebook (Generation F) - Generation Facebook (Generation F) is a term used to define millennials who have grown up using social media as their primary networking tool.
  • gigapop (gigabit point-of-presence) - Gigapop is short for gigabit point-of-presence, an access point to Internet2, the network collaboration between universities and partners in industry and government to develop advanced Internet technologies and applications such as telemedicine and digital libraries.
  • goat - In biometric verification, a goat is a system end-user who is refused access to the system because their biometric data pattern is outside the range recognized by the system.
  • Godwin's law - Godwin's law, also known as Godwin's rule of Hitler analogies, is a statement maintaining that if any online discussion continues long enough, someone will almost certainly compare someone else to Hitler.
  • Google News Initiative (GNI) - Google News Initiative (GNI) is a cooperative effort between Google and a number of large traditional news media providers to restore viewership of these channels as a claimed effort to support authoritative journalism.
  • Googlewhacking - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close