An app or mobile app is a type of software program that can run on the internet, a computer or mobile device (termed a mobile app) most often downloaded from the Apple Store (iOs) or the Play Store (Google).
A browser is a software program that allows you to search for and retrieve information created for display on the World Wide Web. Examples of browsers are Google Chrome, Safari, Datacappy, Internet Explorer (IE) and Firefox.
A coaxial cable is the primary type of cabling used by the cable television industry and is also widely used for computer networks, such as Ethernet. It is much less susceptible to interference and can carry much more data.
Domain Name Servers (DNS) are essentially the Internet's phone book. They are directories of all the domain names which are translated to Internet Protocol (IP) addresses and housed at the Central Registry.
When you type in a web address, e.g., www.tomshats.com, your Internet Service Provider sees the DNS associated with the domain name, translates it into a machine friendly IP address (for example 184.108.40.206 ) and directs your Internet connection to the correct website.
A domain name does not contain actual information but points to the place where the IP address information resides. The IP address is the actual code and the domain name is the nickname for that code. Every domain name has a top level domain such as .com, .net., .edu, .gov. or .org.
A firewall is a security device (software or hardware) that acts as a filter between a secure area (i.e. your computer) and a less secure area (i.e. the internet) based upon a set of rules defined by the user. When a firewall is running, users are warned when a site they visit seems suspicious.
A Wi-Fi hotspot is a location that enables you to connect to a network or the Internet with wireless adapters. Some mobile phone carriers offer a device called a Mobile Hotspot, which allow you to connect non-phone devices to the data network of the mobile phone carrier.
Network Hubs' is the most common term and is a connection point for network devices which connect LAN (local area network) segments and may also have multiple ports (such as printers,storage devices, workstations and servers).
An ISP is the common industry term for a company that is able to provide you with access to the Internet. Users cannot connect to the Internet without first setting up an account with an internet service provider.
A keyword is a word(s) entered into a search engine which then returns web page results based upon that specific word(s). Example: Typing in “large breed dogs” will return a list of web sites relating to large breed dogs.
A mobile device is a small, handheld computer which has an operating system able to run mobile apps, take pictures, send/retrieve email and connect to the internet via your cell phone carrier and/or Wi-Fi (wireless local area networking).
A modem communicates with your Internet service provider’s network. It connects by cable, telephone, satellite, or fiber and gives you a standard Ethernet cable that you plug into any router (or a single computer) to get an Internet connection.
A network is a group of two or more computer systems linked together. Examples of computer networks are local-area networks (LANs) ( in the same building), wide-area networks (WANs) (computers are farther apart and are connected by telephone lines or radio waves) or campus-area networks (CANs) (computers are within a limited geographic area, such as a campus or military base).
The operating system is the software that comes installed on a computer that manages the overall operation of your computer and gives you a general interface in which to perform tasks. Examples are Windows 10 (Microsoft) or OS X (Apple).
On a device, a port is a hole or connection found on the front or back of a computer which allows computers to access an external device such as a printer. On the Internet, a software or network port is a location where information is sent. Port 80 is the standard http network port. If you want to block ports on your network, you can use a software or hardware firewall.
A proxy or proxy server acts as the “middleman” or hub that adds in a layer of protection to make you anonymous. Any requests you perform on the internet will appear as if they are coming from the proxy server address rather than from your computer’s address.
A search engine is a computer program specifically designed to search documents on the World Wide Web for a particular word and then present these findings in a list format for you. Examples are Google, Bing, Yahoo, Baidu, Ask.com, Duck Duck Go.
Spam is electronic junk mail advertising for anything from business schemes to pharmaceutical drugs, weight loss programs, online degrees, job opportunities and online gambling. Email filters can be established to put these emails into a separate folder so you do not have to see them.
A whitelist is a list of allowed hosts that you create within Blindcut. It is your personal list of ads, third party hosts and cookies that YOU have approved (it’s the reverse of a blacklist) and therefore allow on websites that you visit.
Wi-Fi uses one of the IEEE 802.11 wireless standards to achieve a wireless connection to a network. A home wireless network uses a wireless access point or router to broadcast a signal using WAP or WEP encryption to send and receive signals from wireless devices on the network.
A wireless local area network (WLAN) is a type of local area network (LAN) that provides wireless network communication over short distances using radio or infrared signals rather than traditional network cabling. WLANs most commonly use Wi-Fi or Bluetooth as the wireless network protocol allowing multiple devices such as mobile phones, laptops, tablets, Internet audio systems and game consoles.
The World Wide Web is the graphical interface (HTTP) built on top of the internet which we use to access and transmit data. The World Wide Web cannot function without the engine of the internet running in the background.
A cookie is a little bit of data placed by a website on a user's computer while the user is browsing. Cookies remember information such as items you have placed in a shopping cart, names and addresses, passwords and credit card numbers. Cookies are often used to gather information on a user’s browsing history.
Third party hosts are companies contracted by websites to perform additional services such as providing ads, extra content and search bar functionality (such as an autofill functionality in a search bar). A third party host can intercept and access user data that is exchanged between the user and the website.