Internet, Networking, & Security Home Networking Top 20 Internet Terms for Beginners Don't let common internet terms befuddle you Share Pin Email Print Home Networking The Wireless Connection Routers & Firewalls Network Hubs ISP Broadband Ethernet Installing & Upgrading Wi-Fi & Wireless By Paul Gil Writer Paul Gil, a former Lifewire writer who is also known for his dynamic internet and database courses and has been active in technology fields for over two decades. our editorial process Paul Gil Updated November 13, 2019 678 678 people found this article helpful The internet is a vast interconnection of computer networks comprising millions of computing devices. Desktop computers, mainframes, smartphones, tablets, GPS units, video game consoles, and smart devices all connect to the internet. No single organization owns or controls the internet. The World Wide Web, or web for short, is the space where digital content is served to users of the internet. The web contains the most popular content on the internet and — most likely — much of the content that beginning internet users ever see. For a beginner who strives to make sense of the internet and the World Wide Web, an understanding of basic terms is bound to be helpful. Browser Oleksiy Maksymenko / Getty Images Beginning and advanced internet users all access the web through web browser software, which is included on computers and mobile devices at the time of purchase. Other browsers can be downloaded from the internet. A browser is a free software package or mobile app that displays web pages, graphics, and most online content. Popular web browsers include Chrome, Firefox, Internet Explorer, Microsoft Edge, and Safari, but there are many others. Browser software is specifically designed to convert HTML and XML computer code into human-readable documents. Browsers display web pages. Each web page has a unique address called a URL. Web Page Westend61 / Getty Images A web page is what you see in your browser when you are on the internet. Think of the web page as a page in a magazine. You may see text, photos, images, diagrams, links, advertisements, and more on any page you view. Often, you click or tap on a specific area of a web page to expand the information or move to a related web page. Clicking on a link — a snippet of text that appears in color different from the rest of the text — takes you to a different web page. If you want to go back, you use the arrows provided for that purpose in most browsers. Several web pages on a related subject make a website. URL KTSDESIGN / Getty Images Uniform Resource Locators — URLs — are the web browser addresses of internet pages and files. With a URL, you can locate and bookmark specific pages and files in your web browser. URLs can be found all around us. They may be listed at the bottom of business cards, on TV screens during commercial breaks, linked in documents you read on the internet or delivered by one of the internet search engines. The format of a URL resembles this: http://www.examplewebsite.com/mypage which is frequently shortened to this: www.examplewebsite.com/mypage Sometimes they are longer and more complicated, but they all follow acknowledged rules for naming URLs. URLs consist of three parts: Protocol: The protocol is the portion ending in //: Most web pages use the protocol http or https, but there are other protocols. Host: The host or top-level domain, which frequently ends in .com, .net, .edu or .org but can also end in one of many others that have been officially recognized.Filename: The filename or page name itself. HTTP and HTTPS SEAN GLADWELL / Getty Images HTTP is the acronym for "Hypertext Transfer Protocol," the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in your web browser. HTTPS is the acronym for "Hypertext Transfer Protocol Secure." This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others. Whenever you log in to your online bank account or a shopping site that you enter credit card information into, look for "https" in the URL for security. HTML and XML Logovski / Getty Images Hypertext Markup Language (HTML) is the programming language of web pages. HTML commands your web browser to display text and graphics in a specific fashion. Beginning internet users don't need to know HTML coding to enjoy the web pages the programming language delivers to browsers. XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XHTML is a combination of HTML and XML. IP Address Perry Mastrovito / Getty Images Your computer and every device that connects to the internet uses an Internet Protocol address for identification. In most cases, IP addresses are assigned automatically. Beginners don't usually need to assign an IP address. An IP address can look something like this: 188.8.131.52 or like this 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A Every computer, smartphone, and mobile device that accesses the internet is assigned an IP address for tracking purposes. It may be a permanently assigned IP address, or the IP address may change occasionally, but it is always a unique identifier. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address serves as the equivalent of an automobile license plate to enforce accountability and traceability. ISP Lane Oatey / Blue Jean Images / Getty Images You need an Internet Service Provider (ISP) to get to the internet. You may access a free ISP at school, a library or work, or you may pay for a private ISP at home. An ISP is the company or government organization that plugs you into the vast internet. An ISP offers a variety of services for a variety of prices: web page access, email, web page hosting, and so on. Most ISPs provide various internet connection speeds for a monthly fee. You may choose to pay more for a higher-speed internet connection if you like to stream movies or select a less expensive package if you use the internet mostly for light browsing and email. Router Kittichai Boonpong / EyeEm / Getty Images A router or router-modem combination is the hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP. A router can be wired or wireless or both. Your router provides a defense against hackers and directs content to the specific computer, device, streaming device, or printer that should receive it. Often your ISP provides the network router it prefers for your internet service. When it does, the router is configured appropriately. If you choose to use a different router, you may need to enter information into it. Email MirageC / Getty Images Email is electronic mail. It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service — Gmail or Yahoo Mail, for example — or an installed software package such as Microsoft Outlook or Apple Mail. Beginners start by creating one email address that they give to their family members and friends. However, you aren't limited to one address or email service. You may choose to add other email addresses for online shopping, business, or social networking purposes. Email Spam and Filters Epoxydude / Getty Images Spam is the jargon name of unwanted and unsolicited email. Spam email comes in two main categories: high-volume advertising, which is annoying, and hackers attempting to lure you into divulging your passwords, which is dangerous. Filtering is the popular-but-imperfect defense against spam. Filtering is included in many email clients. Filtering uses software that reads your incoming email for keyword combinations and then either deletes or quarantines messages that appear to be spam. Look for a spam or junk folder in your mailbox to see your quarantined or filtered email. To protect yourself against hackers who want your personal information, be suspicious. Your bank won't email you and ask for your password. The fellow in Nigeria doesn't really need your bank account number. Amazon isn't handing you a free $50 gift certificate. Anything that sounds too good to be true probably isn't true. If you are unsure, do not click any links in the email and contact the sender (your bank or whomever) separately for validation. Social Media Daniel Sambraus / Getty Images Social media is the broad term for any online tool that enables users to interact with thousands of other users. Facebook and Twitter are among the largest social networking sites. LinkedIn is a combination of social and professional site. Other popular sites include YouTube, Instagram, Pinterest, Snapchat, Tumblr, and Reddit. Social media sites offer free accounts to everyone. When selecting the ones that interest you, ask your friends and family which ones they belong to. That way, you can join a group where you already know people. As with all things internet-related, protect your personal information when you sign up for sites. Most of them offer a privacy section where you can choose what to reveal to other users of the website. E-Commerce Guido Mieth / Getty Images E-commerce is electronic commerce — the transactions of selling and buying online. Every day, billions of dollars exchange hands through the internet and the World Wide Web. Internet shopping has exploded in popularity with internet users, to the detriment of traditional brick-and-mortar stores and malls. Every well-known retailer has a website that showcases and sells its products. Joining them are dozens of small sites that sell products and enormous sites that sell just about everything. E-commerce works because reasonable privacy can be assured through HTTPS secure web pages that encrypt personal information and because reliable businesses value the internet as a transaction medium and make the process simple and safe. When shopping on the internet, you are asked to enter a credit card, PayPal information, or other payment information. Encryption and Authentication John Lund / Getty Images Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. When reliable encryption is in place, your banking information and credit card numbers are kept private. Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are. Downloading Epoxydude / Getty Images Downloading is a broad term that describes transferring something you find on the internet or World Wide Web to your computer or another device. Commonly, downloading is associated with songs, music, and software files. For example, you might want to download a new musical ringtone for your smartphone or download a trial copy of Microsoft Office. The larger the file you are copying, the longer the download takes to transfer to your computer. Some downloads take seconds; some take minutes or longer, depending on your internet speed. Web pages that offer material that can be downloaded are usually clearly marked with a Download button (or something similar). Cloud Computing Sean Gallup / Getty Images Cloud computing began as a term to describe software that was online and borrowed, instead of purchased and installed on your computer. Web-based email is one example of cloud computing. The user's email is all stored and accessed in the cloud of the internet. The cloud is the modern version of the 1970s mainframe computing model. As part of the cloud computing model, software as a service is a business model that assumes people would rather rent software than own it. With their web browsers, users access the cloud on the internet and log in to their online rented copies of their cloud-based software. Increasingly, services offer cloud storage of files to facilitate the ability to access files from more than one device. It is possible to save files, photos, and images in the cloud and then access them from a laptop, smartphone, tablet, or another device. Cloud computing makes collaboration among individuals on the same files in the cloud possible. Firewall skaman306 / Getty Images Firewall is a generic term to describe a barrier against destruction. In the case of computing, a firewall consists of software or hardware that protects your computer from hackers and viruses. Computing firewalls range from small anti-virus software packages to complex and expensive software and hardware solutions. Some firewalls are free. Many computers ship with a firewall you can activate. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system. Just like everyone else, beginners to the internet should activate a firewall for personal use to protect their computers from viruses and malware. Malware Lee Woodgate / Getty Images Malware is the broad term to describe any malicious software designed by hackers. Malware includes viruses, trojans, keyloggers, zombie programs, and any other software that seeks to do one of four things: Vandalize your computer in some waySteal your private informationTake remote control of your computer (zombie your computer) for other endsManipulate you into purchasing something Malware programs are the time bombs and wicked minions of dishonest programmers. Protect yourself with a firewall and knowledge of how to prevent these programs from reaching your computer Trojan Towfiqu Photography / Getty Images A Trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, Trojan programs masquerade as legitimate files or software programs. Sometimes, it is an innocent-looking movie file or an installer that pretends to be actual anti-hacker software. The power of the Trojan attack comes from users naively downloading and running the Trojan file. Protect yourself by not downloading files that are sent to you in emails or that you see on unfamiliar websites. Phishing Peter Dazeley / Getty Images Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords or PINs. Often in the form of fake PayPal warning messages or phony bank login screens, phishing attacks can be convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users — beginners and long-time users alike — should distrust any email link that says, "You should log in and confirm this." Blogs Peter Dazeley / Getty Images A blog is a modern online writer's column. Amateur and professional writers publish blogs on all kinds of topics: their hobby interests in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, or tech tips on using Microsoft Office. Absolutely anyone can start a blog. Blogs are usually arranged chronologically and with less formality than a website. Many of them accept and respond to comments. Blogs vary in quality from amateurish to professional. Some savvy bloggers earn reasonable incomes by selling advertising on their blog pages.