address mask (Subnet Mask) : This is used to recognize the sections of an IP address that concur with the different parts. Also known as the "subnet mask".
alias : A nickname that refers to a network resource.
anonymous FTP : This is a method of bypassing security checks when you logon to an FTP site. This is done by typing "anonymous" as your user ID and your e-mail address as the password.
application : A program that performs for a certain purpose.
Archie : A method of automatically collecting, indexing, and retrieving files from the Internet.
ATM (Asynchronous Transfer Mode) : A transfer mode that designates bandwidth using a fixed-size packet or cell. Also called a "fast packet".
authentication : A method of identifying the user to make sure the user is who he says he is.
bandwidth : A measurement in Hz that reads the difference between the highest and lowest frequencies of a transmission.
BBS (Bulletin Board System) : A computer which provides file archives, email, and announcements of interest. Users usually dial in with a terminal program to access these.
bounce : This term refers to when you send an e-mail to a non-existent recipient and the e-mail is "bounced" back to you.
BTW : By the way.
Bulletin Board System (BBS) : A computer which provides file archives, email, and announcements of interest. Users usually dial in with a terminal program to access these.
CHAP (Challenge-Handshake Authentication Protocol) : A method of authentication when connecting to an Internet service provider.
Challenge-Handshake Authentication Protocol (CHAP) : A method of authentication when connecting to an Internet service provider.
CHAT : Conversational Hypertext Access Technology.
CIX : Commercial Internet Exchange.
client : An application that performs for a certain purpose.
cracker : Persons who attempt to gain illegal access to computers. Not to be confused with hackers.
Cyberspace : According to M.N.A "the world of computers and the society that gathers around them."
Data Encryption Key (DEK) : Used for encryption and decryption of message text.
Data Encryption Standard (DES) : Standardized encryption method used most on the Internet.
datagram : A block of data that can travel from one Internet site to another without relying on an earlier exchange between the source and destination computers.
DDN (Defense Data Network) : The United States Department of Defense global communications network.
DECnet : A proprietary network protocol designed by Digital Equipment Corporation.
dedicated line : A communications line used solely for computer connections, such as T1 and T3 lines. An additional phone line solely for your modem is a dedicated line as well.
Defense Data Network (DDN) : The United States Department of Defense global communications network.
dial-up : Most widely used way of accessing the Internet. This involves one computer connecting to another by way of a modem.
DNS (Domain Name Service) : A name service used with TCP/IP hosts. A DNS exists on numerous servers over the Internet. It is a database for finding host names and IP addresses on the Internet and trying to figure them out.
domain : An area on host or an IP address.
Domain Name Service (DNS) : A name service used with TCP/IP hosts. A DNS exists on numerous servers over the Internet. It is a database for finding host names and IP addresses on the Internet and trying to figure them out.
dot address : IP addresses in the form of 18.104.22.168 in a 4-byte IP address where each number is equal to 1 byte.
electronic mail (e-mail) : Electronic mail, or e-mail, is a way users with a computer can send messages between each other easily and more quickly than regular mail.
e-mail (Electronic Mail) : Electronic mail, or e-mail, is a way users with a computer can send messages between each other easily and more quickly than regular mail.
Userid represents the identification of the person, the @ is what separates the userid from the domain name, and the domain name refers to the host that the person is using.
encryption : This is what Internet security is built upon. Encryption will scramble information so it is readable only by the intended recipient.
Ethernet : An Ethernet connection is a LAN (Local Area Network) that consists of computers connected by twisted-pair or coaxial cable. Transfers can be made on an Ethernet connection at up to 10 Mb/s.
FAQ : Stands for Frequently Asked Questions. FAQ's are available almost anywhere on the Internet. FAQ's are usually used as a place to look for help or advice when working on the Internet or on your computer.
File Transfer Protocol (FTP) : FTP's are the most widely used format to uploading and downloading files on an Internet connection. FTP's are used so computers can share files between each other.
Finger : A finger is a UNIX command that displays information about a group or user on the Internet.
flame : This is a negative response to a newsgroup posting or e-mail message. If makes a newsgroup post or sends an e-mail message that is deemed inappropriate, they might get flamed. The most popular method of flaming is a mail bomb. This is where the sender or poster receives an overwhelming amount of messages in his or her mailbox and their system can crash.
follow-up : A response to a newsgroup posting or e-mail message.
FTP (File Transfer Protocol) : FTP's are the most widely used format to uploading and downloading files on an Internet connection. FTP's are used so computers can share files between each other.
Gopher : A search and retrieval tool for information used mostly for research.
hacker : A user of a computer who attempts to understand the particulars of a computer. A hacker will look for ways around things while using a computer.
host : Any computer that is connected to the Internet or a network.
host address : The address of the host computer which is on the Internet.
HTML (Hypertext Markup Language) : HTML stands for Hypertext Markup Language. This is the standard method of publishing web documents onto the World Wide Web (WWW). HTML consists of tags surrounded by brackets.
hypermedia : A combination of hypertext and multimedia in a document online.
hypertext : A kind of text that permits embedded links to other documents.
Hypertext Markup Language (HTML) : HTML stands for Hypertext Markup Language. This is the standard method of publishing web documents onto the World Wide Web (WWW). HTML consists of tags surrounded by brackets.
Integrated Services Digital Network (ISDN) : Integrated Services Digital Network (ISDN) combines digital network services and voice into one. Users can access digital services at 115,200 bps.
Internet : A vast, uncontrolled network of computers that is available almost anywhere in the world. Basically, when you sign on to the Internet, you become a part of it.
Internet protocol (IP) : A packet switching prot+B220ocol that is used as a network layer in the TCP/IP protocol suite.
Internet Protocol Address (IP Address) : Each computer is assigned an IP address. These are similar to phone numbers. When you attempt to connect to an IP address, you will connect to the computer with that IP address.
Internet Relay Chat (IRC): Internet Relay Chat, or IRC, allows users to chat on different channels over the Internet. IRC channels are preceded by a # sign and are controlled by channel operators. Channel operators can kick people out of the channel if he or she feels necessary.
Internet Service Provider (ISP): An organization or company that has a network with a direct link to the Internet. This is done by using a dedicated line connection, usually through a link known as a T1 connection. Users can dial into to that network using their modem. Most ISP's now charge a monthly fee.
IP (Internet Protocol): A packet switching protocol that is used as a network layer in the TCP/IP protocol suite.
IP Address (Internet Protocol Address): Each computer is assigned an IP address. These are similar to phone numbers. When you attempt to connect to an IP address, you will connect to the computer with that IP address.
IRC (Internet Relay Chat): Internet Relay Chat, or IRC, allows users to chat on different channels over the Internet. IRC channels are preceded by a # sign and are controlled by channel operators. Channel operators can kick people out of the channel if he or she feels necessary.
ISDN (Integrated Services Digital Network): Integrated Services Digital Network (ISDN) combines digital network services and voice into one. Users can access digital services at 115,200 bps.
ISP (Internet Service Provider): An organization or company that has a network with a direct link to the Internet. This is done by using a dedicated line connection, usually through a link known as a T1 connection. Users can dial into to that network using their modem. Most ISP's now charge a monthly fee.
LAN : Local Area Network. A LAN allows users to share files between computers, send e-mail and access the Internet. Most companies use Local Area Networks so that users can access information within or outside the LAN.
leased line : A leased line is a dedicated line that connects a user or network to another network or an ISP.
Listserv : An automated mailing list distribution system.
lurking : Lurking involves simply listening or watching and not participating on an IRC channel, a mailing list, or some other type of Internet connection.
Fashion tips: essential accessories for a woman's wardrobe
There are several essential items that every women should have in her wardrobe. Some of these vital accessories include cardigans, wallets, hoop earrings, and scarves. A woman's wardrobe should include items that are not only stylish and flattering, but versatile and functional as well. There are several essential accessories that no modern woman should be without. Check them out:
Cardigans Cardigans are button-up sweaters, and they are a key wardrobe accessory that every woman should have. It is a good idea to have four cardigans: one black one, one tan, one white, and one gray. By getting these four colors in particular, you are pretty much covering all of your bases as far as being able to match with any other item in your wardrobe. You will be hard-pressed to find anything that doesn't match with at least one of these colors. Many times, you wear a short-sleeved shirt or a tank top, but you need something to bring along with you that is lighter than a jacket in case you feel like covering up for whatever reason. Well, a cardigan will solve that problem easily and fashionably. Brightly-Colored Scarves Brightly-colored scarves are an important accessory to have because they can add vibrancy to your style. If you are like most women, you love the slimming qualities of black clothes, but you don't want to look like you are in mourning. Adding a colorful scarf to your outfit can completely change the "all-black" look. Instead of looking gothic and somber, you will look artistic and sleek.
Hooded Sweatshirt Not every day is a glamorous day, and for those not-so-glam days when you still want to look nice, a hooded sweatshirt is an essential. Your hooded sweatshirt should be a fitted style. You never ever want to wear a big, baggy hooded sweatshirt because you will lose your figure and femininity under all that fabric. Black Pumps Black pumps should be a staple in your wardrobe, and you will probably get more use out of these than any other pair of shoes you will ever own. While most women love to have dozens of shoes, the black pump is the staple shoe because it can be worn with so many things ? dresses, skirts, jeans, suits, and even lingerie.
Hoop Earrings Hoop earrings are very stylish and versatile accessories that are sure to look great with almost anything that you may be wearing. You should purchase either silver or gold, depending on the metal that you prefer. If you have to make the shift from work clothes to evening clothes, a pair of hoop earrings is perfect for either setting, so they will give you one less thing to worry about! Bag Hands-down, the absolute most essential accessory item is a bag. Many women feel that they keep their whole life in their bag ? their money, their date book, their extra nylons, their powder compact and lipstick, photos, etc. If you can only afford one bag, make it a black or tan one so that you have a good chance of matching with most of your outfits.
Black Wrap Every little black dress deserves a little black wrap. If you have your sexy little dress on, the last thing you will want to do is hide it underneath a jacket. A wrap can give you a little shelter from the cold without sheltering your dress from view. Wallet Wallets aren't just a place to hold your cash and credit cards anymore ? they are a fashion statement. This may not seem like a wardrobe accessory that you would care about, but many women, especially singles, go out to bars and clubs with just a wallet ? not a bag. Therefore, you want your wallet to be cute and functional. For one, you should get a wallet that closes securely, rather than being open at the top like a men's wallet. Also, get a wallet that is likely to match most of your outfits, like a black or a tan one. Hair Ties Hair ties are an essential accessory because you never know when you are going to need one. If you have a short (too short for a ponytail) hairstyle, then you are exempt from this essential accessory.
We search top stores daily so you don't have to.
For personal non-commercial use only; please check stores for current prices and exact amounts. Product specifications are obtained from merchants or third parties. Although we make every effort to present accurate information, Okto is not responsible for inaccuracies. Store ratings and product reviews are submitted by online shoppers; they do not reflect our opinions and we have no responsibility for their content.
As remuneration for time and research involved to provide quality links, we generally use affiliate links when we can. Whenever we link to something not our own, you should assume they are affiliate links or that we benefit in some way.
OKto.com - 4283 Express Lane, SUITE 003-239, Sarasota, FL 34238, p: (941) 538-6941, f: 8154253395, e: support [at] okto.com