Sunteți pe pagina 1din 7

In computing, a cache is a component that transparently stores data so that future requests for that data can be served

faster. A web cache is a mechanism for the temporary storage (caching) of web documents, such as HTML pages and images, to reduce bandwidth usage,server load, and perceived lag. - A web cache stores copies of documents passing through it; A cookie is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website. Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user's previous activity.[1] - Cookies were designed to be a reliable mechanism for websites to remember information (such as items in a shopping cart) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited by the user as far back as months or years ago). Although cookies cannot carry viruses, and cannot install malware on the host computer,[2] tracking cookies and especially third-party tracking cookies are commonly used as ways to compile long-term records of individuals' browsing histories - Cookies can also store passwords and form content a user has previously entered, such as a credit card number or an address. When a user accesses a website with a cookie function for the first time, a cookie is sent from server to the browser and stored with the browser in the local computer. Later when that user goes back to the same website, the website will recognize the user because of the stored cookie with the user's information. A uniform resource locator, abbreviated as URL - web address, particularly when used with HTTP - is a specific character string that constitutes a reference to a resource.

-address

A URL has two main components:

Protocol identifier: For the URL http://example.com, the protocol identifier is http.

Resource name: For the URL http://example.com, the resource name is example.com.

The resource name is the complete address to the resource. The format of the resource name depends entirely on the protocol used, but for many protocols, including HTTP, the resource name contains one or more of the following components:

Host Name The name of the machine on which the resource lives. Filename The pathname to the file on the machine. Port Number The port number to which to connect (typically optional). Reference A reference to a named anchor within a resource that usually identifies a specific location within a file (typically optional).

Hypertext link directs you to the web page; underlined in blue http://www.microsoft.com./windows/ie/newuser/default.asp http:// (ID) www (unchanging ID, identification for the world wide web) .com (domain name - company) Microsoft (Host they manage the content of that particular website) for organizations 3 or more letters for geographical only 2 letters

http: for hypertext https: for hypertext with secure link ftp: for fil transfr protocol files mailto: for e-mail addresses .html or .htm : index.html or default.html 2. .txt 3. .gif, .jpg : photos 4. .mp3, .wav : music 5. .zip, .sit., .gz : compressed files 6. .org, .edu., .gov cache - spaces on your hard drive that stores things you downloaded from the internet web browsers cache - Facebook, stored on your hard drive so every time you visit it remembers and it loads faster cookies - strings of info (user id, password) most common use is to store user id on caches proxy setting - makes things load faster

ELECTRONIC MAIL (E-MAIL) IP ADDRESS acts like a telephone number so it can bridge between the host and you; your gadgets have IP addresses Bcc blind carbon copy; if you want to hide something.; not everyone can see who the email was sent to Cc carbon copy; everyone can see who the email was sent to *sending your CV for a job: email title: Jeremiah Abesamis Manangement Trainee Applicant Good day!

I am ______ from the Ateneo Sincerely, (name) BS Management (year graduated) ADMU Virus popular viruses 1999 Melissa virus (destroyed microsfot) 2001 Code Red (Trojan virus) 2004 Mydoom Virus Anti-virus Softwares www.virusbtn.com - anti-virus softwares usually detects viruses in incoming mail, but that isnt so of zip files The Virus Family E-mail Virus attacks your contacts and addresses, sends random emails to them; viruses are usually on attachments, not in the message itself Time Bomb has a time to be active Trojan Horse most popular virus, appear as games, applications Worm multiply fast, viruses found on USBs

MAC VIRUSES Home folder documents you have Contacts because its open

How does your computer get its IP address? - the computer network gives the IP address - changes from where you are, depends on the server you are connect to (Ex. Ateneo server gives you your personal ID) Static address retains itself forever. You may pay for your own but it has complications when you try to connect to certain servers Dynamic address everything now has a dynamic address. Youre routers give you your

own IP address, no two people have the same IP address - lease system like

MICROSOFT WINDOWS DEVELOPMENT GUI on MS DOS 1985 - Macintosh actually started the interface idea, but Microsoft bought the license - about Macintosh and Windows together - graphical user interface

Windows 95 - now has the capability of internet Windows XP (2001) Windows Vista (2006) - slowest yet Windows 7 (2009) Windows 8 (2012)

FILE MANAGEMENT File Naming Conventions - use 8 or fewer characters for compatibility for other operating systems - use a 3 character file extension (ie. .tif) or your software will not understand what it is - use only alpha-numeric characters, except for dashes and underscores - do not use special characters except for dashes and underscores - all letters should be lowercase (because there are case sensitive operating softwares) - do not use spaces in the file name (web browsers and operating softwares cannot understand spaces) - use leading zeros (pass 1 = pass01, use zeros as placeholders)

Pasting Options Keep text only for numbers, will only keep the text

What is a Markup? - can edit like Gdocs

- click review, put a comment on error - tracking options - you can accept or reject comments - review pane to view the summary of comments - can protect by clicking Document and putting a password for the comments, for tracking changes

INDENTATIONS First line indent indents the first line Second cursor on top hanging line indent; indents everything except the first line Left indent indents everything on the left Right indent everything on the right END NOTE at the end of all the pages (last page) FOOT NOTE citations at the end of the page (per page)1

S-ar putea să vă placă și