Ad blocking is a type of software for desktop computers, laptop computers, tablets and smartphones that can remove advertising content from a website or mobile app.
The address bar or URL bar is a blank space at the top of your browser that allows you to type in a website address. In many cases, address bars double as a search engine option as well.
An app or mobile app is a type of software program that can run on the internet, a computer or mobile device (termed a mobile app) most often downloaded from the Apple Store (iOs) or the Play Store (Google).
Bluetooth® technology allows a Bluetooth®-enabled device (such as headset or a watch) to use radio waves instead of wires or cables to connect to a phone or computer.
A browser is a software program that allows you to search for and retrieve information created for display on the World Wide Web. Examples of browsers are Google Chrome, Safari, Datacappy, Internet Explorer (IE) and Firefox.
A cipher is a specific method or algorithm used to encrypt data. (ex. A=B, B=C, and so on).
A coaxial cable is the primary type of cabling used by the cable television industry and is also widely used for computer networks, such as Ethernet. It is much less susceptible to interference and can carry much more data.
Domain Name Servers (DNS) are essentially the Internet's phone book. They are directories of all the domain names which are translated to Internet Protocol (IP) addresses and housed at the Central Registry. When you type in a web address, e.g.,, your Internet Service Provider sees the DNS associated with the domain name, translates it into a machine friendly IP address (for example ) and directs your Internet connection to the correct website.
A domain name does not contain actual information but points to the place where the IP address information resides. The IP address is the actual code and the domain name is the nickname for that code. Every domain name has a top level domain such as .com, .net., .edu, .gov. or .org.
DSL is a way for home users and small businesses to have high-speed access to the Internet over standard copper lines.
Encryption is the act of taking data and translating it into secret code to establish a layer of security before it is sent over the internet.
The ethernet is the most commonly used LAN (Local Area Network) which provides a fast, efficient, and direct connection to a router via an ethernet cable. ( Wi-Fi is used for wireless connection).
A firewall is a security device (software or hardware) that acts as a filter between a secure area (i.e. your computer) and a less secure area (i.e. the internet) based upon a set of rules defined by the user. When a firewall is running, users are warned when a site they visit seems suspicious.
A gateway is a networked device which serves as an entry point into another network. For example, a wireless router is commonly the gateway in a home network.
A hacker is an expert at breaking into (or “hacking”) networks and computer systems often times leaving malicious software or “bugs”.
A Wi-Fi hotspot is a location that enables you to connect to a network or the Internet with wireless adapters. Some mobile phone carriers offer a device called a Mobile Hotspot, which allow you to connect non-phone devices to the data network of the mobile phone carrier.
HTML is the graphical language used to create documents on the World Wide Web.
HTTP is the software used for communicating data on the World Wide Web.
HTTPS is the software used for communicating data on the World Wide Web but with a layer of encryption for added security.
Network Hubs' is the most common term and is a connection point for network devices which connect LAN (local area network) segments and may also have multiple ports (such as printers,storage devices, workstations and servers).
A hyperlink is a hypertext file (displayed as a highlighted word) that links to another document in a different location either within that same website or to another website.
The Internet is a massive, global computer network which connects smaller computer networks to communicate content from websites. Many people describe the internet as a “network of networks”.
The IP address is a unique number assigned to your computers, tablets and smartphones which essentially acts as a return address when communicating with other devices.
An ISP is the common industry term for a company that is able to provide you with access to the Internet. Users cannot connect to the Internet without first setting up an account with an internet service provider.
A keyword is a word(s) entered into a search engine which then returns web page results based upon that specific word(s). Example: Typing in “large breed dogs” will return a list of web sites relating to large breed dogs.
A local-area network (LAN) is a computer network that extends over short distances such as a single room, building or group of buildings.
A mobile device is a small, handheld computer which has an operating system able to run mobile apps, take pictures, send/retrieve email and connect to the internet via your cell phone carrier and/or Wi-Fi (wireless local area networking).
A modem communicates with your Internet service provider’s network. It connects by cable, telephone, satellite, or fiber and gives you a standard Ethernet cable that you plug into any router (or a single computer) to get an Internet connection.
A network is a group of two or more computer systems linked together. Examples of computer networks are local-area networks (LANs) ( in the same building), wide-area networks (WANs) (computers are farther apart and are connected by telephone lines or radio waves) or campus-area networks (CANs) (computers are within a limited geographic area, such as a campus or military base).
The operating system is the software that comes installed on a computer that manages the overall operation of your computer and gives you a general interface in which to perform tasks. Examples are Windows 10 (Microsoft) or OS X (Apple).
A ping is a query or call to another computer on a network to determine whether there is a connection to it.
On a device, a port is a hole or connection found on the front or back of a computer which allows computers to access an external device such as a printer. On the Internet, a software or network port is a location where information is sent. Port 80 is the standard http network port. If you want to block ports on your network, you can use a software or hardware firewall.
A private server is a machine or virtual machine that is privately administrated with its own email system.
A proxy or proxy server acts as the “middleman” or hub that adds in a layer of protection to make you anonymous. Any requests you perform on the internet will appear as if they are coming from the proxy server address rather than from your computer’s address.
A "refresh" is the act or function of updating the current display on a screen.
A router shares your Internet connection among multiple devices. Wireless routers are most commonly used which host a Wi-Fi network for multiple devices.
A search engine is a computer program specifically designed to search documents on the World Wide Web for a particular word and then present these findings in a list format for you. Examples are Google, Bing, Yahoo, Baidu,, Duck Duck Go.
Social media platforms are online channels of communication that allow you to interact, collaborate and share content (Facebook, Instragram, Twitter, LinkedIn, Wikipedia, Reddit, Pinterest, etc.).
Spam is electronic junk mail advertising for anything from business schemes to pharmaceutical drugs, weight loss programs, online degrees, job opportunities and online gambling. Email filters can be established to put these emails into a separate folder so you do not have to see them.
SSL (Secure Sockets Layer) is the standard security technology for creating an encrypted link between a web servers and a browser.
Trolling is the act of deliberately posting inappropriate or upsetting comments to public forums (chat rooms, blogs or articles) in order to provoke responses.
The URL is the address of a website located on the internet. Standard format:
A USB is a connection point on a desktop, laptop, tablet (and some smartphones) that allows a device to communicate with other devices such as a keyboard or a mouse or flash drive.
VOIP allows you to make voice calls using a broadband Internet connection instead of a regular or analog phone line connection.
A VPN is a private network connection to the internet. People using a virtual private network connect with a unique ID and password and their internet traffic is encrypted.
A whitelist is a list of allowed hosts that you create within Blindcut. It is your personal list of ads, third party hosts and cookies that YOU have approved (it’s the reverse of a blacklist) and therefore allow on websites that you visit.
Wi-Fi uses one of the IEEE 802.11 wireless standards to achieve a wireless connection to a network. A home wireless network uses a wireless access point or router to broadcast a signal using WAP or WEP encryption to send and receive signals from wireless devices on the network.
A wireless local area network (WLAN) is a type of local area network (LAN) that provides wireless network communication over short distances using radio or infrared signals rather than traditional network cabling. WLANs most commonly use Wi-Fi or Bluetooth as the wireless network protocol allowing multiple devices such as mobile phones, laptops, tablets, Internet audio systems and game consoles.
The World Wide Web is the graphical interface (HTTP) built on top of the internet which we use to access and transmit data. The World Wide Web cannot function without the engine of the internet running in the background.
A cookie is a little bit of data placed by a website on a user's computer while the user is browsing. Cookies remember information such as items you have placed in a shopping cart, names and addresses, passwords and credit card numbers. Cookies are often used to gather information on a user’s browsing history.
Third party hosts are companies contracted by websites to perform additional services such as providing ads, extra content and search bar functionality (such as an autofill functionality in a search bar). A third party host can intercept and access user data that is exchanged between the user and the website.

Get Your Data Snappy With Datacappy!