A classroom that is connected to the Internet. Multiple computers access the Net (and other online components) simultaneously, from various locations within the classroom. Typically, a wired classroom utilizes a wireless LAN or wireless Ethernet, which provide high-speed access to multiple computers at a much lower cost than the traditional method of running cables through buildings and connecting them with switches or hubs.
Originally, the process of exchanging reciprocal links with sites was designed increase search engine optimization (SEO) because the idea was to increase the number of sites that link to yours. In the early days, the more Web sites that linked to yours would enable your site to appear first, or higher, in organic search results. In the past, this number of links defined the level of popularity of your site among users of the Internet. However, with the advance of technology, now algorithms have been written to place more value on the quality of the content on Web pages that link to your site, not the quantity. Search engines such as Google now consider link farming as a form of spam and have implemented anti-SEO tactics.
Click on "more info" below to read about Google's Link Filter!
A pointing device consisting of a ball sitting in a socket that contains sensors to detect the rotation of the ball about its two axes. It looks like an upside-down mouse. To move a cursor, the user rolls the ball with his or her thumb or palm. Trackballs are common on CADworkstations, for ease of use, and on laptops, for use where there isn't enough surface area for a mouse. Some trackballs clip onto the side of a keyboard.
A criminal investigator of online fraud or harassment. The Report to the President's Commission on Critical Infrastructure Protection (1997) states, "Cybercops are law enforcement personnel whose beat is cyberspace." The Patriot Act greatly expanded the abilites of cybercops to collect data from the Internet.
A standard for a group of audio and video coding formats. MP4 was introduced in late 1998 and agreed upon by the ISO/IEC Moving Picture Experts Group (MPEG) under the formal standard ISO/IEC 14496. Uses of MP4 include compression of audio and visual data for the Web (streaming media) and CD distribution, voice (telephone, videophone) and broadcast television applications.
Technically, MPEG-4 is a patented collection of methods defining compression of audio and visual (AV) digital data. It was designed to encompass all the features that were part of earlier releases of MPEG files, and add a few more features including (extended) VRML support for 3D rendering, object-oriented composite files (including audio, video and VRML objects), support for externally-specified Digital Rights Management and various types of interactivity.
So great was the success of MP4 that by 1999, it was considered the standard for all types of streaming and broadcast applications online. The functionality of the format was such that programmers were able to easily make use of MP4 on Web sites and in various other applications. Businesses found it to be a great sales and marketing tool, and users had a great time viewing, swapping, and even creating their own streaming media in the MP4 format.
In many places it is illegal to throw away your old electronic devices because they contain significant amounts of hazardous chemicals, and because they are clogging landfills. For example, the picture tube in a TV or a computer monitor typically contains 3 to 5 pounds of lead, and electronic circuit boards have additional lead, cadmium and mercury.
To find out where to recycle such items, contact a recycler on the list of businesses in the Google search below. There is often a fee and certain types of devices are not accepted.
An estimated 1,600 computers become obsolete in the state of Washington alone every day.
Twenty percent of the weight in the glass of a computer monitor is lead.
Computers and other e-waste account for 70 percent of heavy metals, including toxic mercury and cadmium, in U.S. landfills.
As much as 80 percent of e-waste from this country is shipped to developing nations in Asia.
To highlight text or graphics in a software application, or to mark an item on a form. For example, to select content you wish to cut-and-paste, you must use your cursor, hold down your mouse button, and drag your mouse. When filling out an online form, you usually must click inside a radio button or check box to mark it as your selection. To select an item on a select box, you scroll down the menu and click on the desired item.
Predictive text is an input technology most commonly used on cell phones. The technology allows some common words to be entered by a single key-press for each letter, as opposed to the multiple key-press approach used in the older generation of mobile phones. The intent is to simplify the writing of text messages and email.
However, the key sequence 4663 on a telephone keypad in English, will generally be defined as the word "good". However, the same key sequence also corresponds to other words, such as "home", "gone", "hoof", "hood" and so on. Such confusions may lead to mistaken meaning even if all of the words are typed correctly and spelled correctly. For example, "Are you home?" could be rendered as "Are you good?" Words produced by the same combination of key-presses are technically paragrams, but are commonly referred to as textonyms.
For the largest list of Internet acronyms and text message jargon, click on "more info" below!
The state of being connected to the Internet (generally through an ISP, an OSP, or a network). Used as an adjective, it describes a variety of activities that users do on the Internet, for example: online chat, online shopping, online games, online searching, online communities, and on and on. Note that some people think the word "online" in America Online should be spelled as "OnLine" since the "L" is part of the acronym in "AOL." However, the "L" in AOL is just there to make up a better acronym than simply "AO."
Editor's Note: NetLingo does not believe that online should be hyphenated (such as "on-line") due to the fact that in Internet lingo, the majority of words which are hyphenated (such as "e-commerce") are hyphenated because one of the terms is short for another word (in this case "e" is short for "electronic"). The term "online" was actually hyphenated in the beginning (circa 1995) but was quickly revised, and even though other lingo authorities (such as Webster's Dictionary) feel the term "online" should be hyphenated, there is no basis for including the hyphen, instead "on-line" is considered an outdated way of spelling it.
A computer device packaged in a small card, about the size of a credit card, in conformance with the PCMCIA standard. PC cards provide additional memory (RAM or ROM), modem and fax modem capabilities, and can even act as portable disk drives on portable (laptop) computers.
The newest version of the slot on the side of your laptop machine into which you can pop a wireless receiver or some other add-on is called an "Express Card" which comes in two flavors: a narrower one called ExpressCard/34, and a wider one called ExpressCard/54. FYI: As is the case with most kinds of technology upgrades, neither can accept cards designed for the older, PC Card standard.
A "cuckoo egg" is an edited MP3 file that appears to
be a copyright protected song being distributed via the Internet without the
permission of the copyright owner. The initial portion of the song (first 30
seconds or so) will be of the real song. However, the remainder of the song is overwritten by something other than the initial song; usually cuckoo clock
sound effects or or a series of random sounds and noises which are free of any
Cuckoo eggs will have the correct file size and playing
time as the original copyrighted MP3 file will have. The Cuckoo Egg project
was started to discourage people from trading copy protected music files online
The term actually has many different meanings depending on the person, company, or context in which it is being used. Basically, it is a collection of two or more computers and associated devices that are linked together with communications equipment. Once connected, each part of the network can share the software, hardware, and information contained in the other parts.
Also, you may hear Internet companies refer to their "network of Web sites," a group of associated sites that's analogous to a television network or cable TV network.
If you have a small business that uses a network for Internet access and file sharing, be sure to have a firewall installed, to protect yourself from unauthorized access.
Software that gathers information about a user as he or she navigates around the Web, it is intended to track surfing habits in order to build marketing profiles. Spyware is often included in "free downloads" from the Web, where the license agreement (which so many of us accept without reading) may mention that information about your habits will be transmitted back to the company's Web site. Spyware is a major cause for public concern about privacy on the Internet.
Spyware is a type of software that gets onto computers without their users' knowledge. The resource-hungry programs often render machines unusable causing your Internet experience to be very frustrating. It is necessary for you to download and run anti-spyware programs. Past experience has led to using the a combination of programs in conjunction with anti-adware programs and run them at a minimum once a week. Some programs will find certain malware which you delete, and other programs find other adware and malware, which you also delete. (In a test, I personally had it return more than 800 infected files -- this is a huge amount!) Keep running these programs until you get zero infected files and then run these programs at least once a week.
Spyware has forced us to think about the maintenace of our computers in the same way we maintain other things, such as brushing your teeth, cleaning your house, or oiling your car. For example, as a Windowsuser I had to download a Windows Service Pack and run anti-spyware, anti-adware, and an anti-virus program (with a firewall) in order to protect my information. For personal PC users, sometimes multiple programs are needed, and sometimes one suite will do it; businesses hire professionals to maintain their computer systems and keep these malicious programs off of their network.
When programmers shut out all forms of communication because they are entirely focused on-and extremely busy with-writing software (or slinging code). In this state, they are said to be "in the zone." It also refers to "doing what you want to be doing" and can indicate a transition, such as "I'm not in the zone for marriage and kids yet."
This refers to an independent contractor or to a person or company that produces something without the help of an established corporation. For example, since an indie recording label isn't owned by a larger corporation, it does not have to adhere to the industry norms of a big record label. Indies take a grassroots approach. There are many kinds of indie, including indie computer companies
The practice of purchasing a domain name that contains a well-known trademark or commercial name (for example, generalelectric.com). The intent is not to develop it into a Web site but rather to sell it to the rightful owner for a big profit. This practice is being contested in various legal battles, and for the most part, the company wins, not the cybersquatter.
The precursor to the Internet, it was a network developed in the late 1960's and early 1970's by the U.S. Department of Defense. As an experiment in wide area networking (WAN), ARPANet was developed with the goal of being robust enough to survive a nuclear war. Part of the experiment was to study how distributed, noncentralized networks work.
The little trinkets, mementos and toys that decorate one's computer monitor. Objects that are imbued with spiritual or superstitious significance are also referred to as "monitor juju." They make life in a cube more manageable.
Contrary to popular belief, "emo" is not short for "emotional" and it doesn't necessarily imply that someone is sensitive, shy, or introverted, even though the term has morphed and is now used in this way. For example, my friend's dog is overly sensitive so they nicknamed him emo.
Rather the term "emo" originated from a style of rock music characterized by melodic musicianship and expressive, confessional lyrics. It originated in the mid-1980s hardcore punk movement of Washington, D.C., where it was known as "emotional hardcore" or "emocore" which was pioneered by bands like Rites of Spring and Embrace.
Generally emo is tied to both music and fashion as well as the emo subculture, which is stereotyped as tight jeans on males and females alike, long bangs brushed to one side of the face or over one or both eyes, dyed black, straight hair, tight short-sleeved t-shirts with names of emo bands on them, studded belts, belt buckles, canvas sneakers, skate shoes, or other black shoes, and in some cases thick, black horn-rimmed glasses.
You often see this term online and as the style spread to younger teenagers, it became associated with depression, self-injury, and suicide. Some millennials describe "being
emo" like "being a goth" only much less dark and much more Harry Potter with the
differences being emos hate themselves whereas goths hate everyone;
emos want to kill themselves whereas goths want to kill everyone.
For example, as seen on Wikipedia: emo music has been blamed for the suicide by hanging of Hannah Bond by both the coroner at the inquest into her death and her mother, Heather Bond, after it was claimed that emo music glamorized suicide and her apparent obsession with My Chemical Romance was said to be linked to her suicide. The inquest heard that she was part of an Internet "emo" cult and her Bebo page contained an image of an 'emo girl' with bloody wrists. It also heard that she had discussed the "glamor" of hanging online and had explained to her parents that her self harming was an "emo initiation ceremony". Heather Bond criticized emo fashion, saying: "There are 'emo' websites that show pink teddies hanging themselves." After the verdict was reported in a popular music magazine, fans of emo music contacted the magazine to defend against accusations that it promotes self harm and suicide.
Office slang for an incoming phone call transferred without notice or explanation from the transferring party. For example, "Someone in customer service cold transferred the call to me - by that point the guy was ready to crawl through the wire and kill somebody."
A system of digital certificates (and other registration authorities) that verify and authenticate the validity of each party involved in an Internet transaction. PKI lays the groundwork for requiring users to have an issued key (or password) to access information. PKIs are in development; there is no universal PKI or even a single agreed-upon standard for setting up a PKI, but nearly everyone agrees that reliable PKIs are necessary before e-commerce can become widespread.
The modern version of the pink slip parties during the tech bust beginning in 1999, it refers to the 2009 recession in which
thousands of white-collar workers may be out of work, but still manage to make
it to the gym. In this line of thinking, losing a job is like pulling
up the anchor that once moored you to a mortgage, a daily routine and a
career, setting you free to have some fun and pursue other interests. Blogging is become a popular sideline for the newly sacked.
A company that provides a safe and secure way to pass access to your digital assets to friends and loved ones, especially in the event you die. Services include "a digital safety deposit box" where you store passwords to all of your online accounts (emails, photos, social networks, everything online that requires a login) for easy access. For every account you store, you can assign a beneficiary, someone to whom you want to entrust your digital content for the future.