Basic Knowledge of Computer PDF
Basic Knowledge of Computer PDF
Basic Knowledge of Computer PDF
Charles Steed
This book contains information gathered from many sources. It is published for gen-
eral reference and not as a substitute for independent verification by users when
circumstances warrant. It is sold with the understanding that neither the author nor
publisher is engaged in rendering legal, psychological, accounting or professional
advice. The publisher and author disclaim any personal liability, either directly or
indirectly, for advice presented within. Although the author and publisher have used
care and diligence in the preparation, and made every effort to ensure the accuracy
and completeness of information contained in this book, we assume no responsibility
for errors, inaccuracies, omissions, or any inconsistency herein. Any slights of people,
places, publishers, books, or organizations are unintentional.
The online version of this text has been slightly modified to faciliate easy download-
ing. No significant differences from the printed version are present.
ISBN 0-9654396-2-3
Close Up On
The Truth About Online Travel 189
The Internet Shoppers Guide 194
The Truth About Investing Online 198
Avoiding Web Frauds & Scams 203
ECommerce Close Up 213
Fun Stuff
Fun with Easter Eggs 221
Emoticons: Put a Smile in That File! 232
Online Shorthand: Common Email & Chat Acronyms 236
A/B switch a two-way switch used for parallel or serial port cables. An A/B switch
may be used to connect two devices such as printers or modems to the same
computer. Care must be taken to use only the devices that are actually con-
nected at any one time.
Abort, Retry, Fail? a DOS error message displayed when a disk is unreadable.
Each of these words gives the user the option to continue as indicated.
absolute URL a URL that contains the entire address identifying the machine,
directory and file. For example, http://www.keenagers.com/community/friend-
finder.htm is the site address of a service known as “friend finder” on the
keenagers.com Website.
accelerator a hardware device such as a card, that makes an operation, run faster.
Without the device, the computer’s microprocessor would be the sole operator
of the function.
acceptable use policy the terms and conditions of use for Internet providers, inter-
active Websites, and networks which must be agreed upon before the user is
granted access to the service. Among the conditions of use can be found
access provider 6
privacy policies, email policies, courtesy standards, and other parameters the
provider deems appropriate for users of the service. Users must agree to the
terms or they are denied access to services.
access provider (ISP or Internet service provider) A private company that provides
customers access to the Internet in exchange for a fee, though some companies
are now offering this service for free.
access time the time necessary for a memory device to deliver data to the CPU. see
CPU, DRAM, SRAM.
acquire to transfer a file from an analog source such as a scanner. see import.
Acrobat Adobe software for reading and creating PDF files. Acrobat Reader (free
software from Adobe) allows the user to print and view PDF files created in
many different formats. see Adobe Acrobat, PDF
active matrix a type of flat-panel liquid crystal display (LCD) that delivers better
clarity and contrast than the passive-matrix display.
ad server a type of server that manages and maintains ad banners for a Website or
a group of Websites. These programs are capable of keeping track of and re-
porting Website usage statistics. Ad servers also provide the ability to rotate
banners so a user won’t see the same ad every time she visits the page.
address a number that identifies the location of data, usually on the main disk, but
possibly on a server.
7 Alt
Adobe Acrobat a reader that decodes, reads and converts documents to the Por-
table Document Format (PDF). This program allows scalable graphics and
type to be displayed and printed from any computer and from any platform
(Macintosh, Windows, DOS, or UNIX) regardless of the fonts or software
programs used to create the original. Acrobat is freely available for download-
ing on many Websites. see PDF.
Adobe Systems Inc. Adobe Systems Inc. is a provider of graphic design, publish-
ing, and imaging software for Web and print production. The company offers a
line of application software products for creating, distributing, and managing
information of all types. Many graphic designers feel Adobe programs have set
the industry standard for design and publishing software.
agent software operating in the background that performs an automatic and silent
task such as information gathering.
airbrush a creative tool in many paint programs that simulates the action of a real
paint gun on the computer screen. see spray can.
alias the use of an icon as a method of starting an application, opening a folder, file
or disk. With Macintosh products the alias may be placed anywhere that is
convenient such as the Apple menu, the desktop, or a special folder. The title of
an alias icon is in italics. In Windows, an alias is known as a shortcut. see
shortcut.
allocation unit units of space on a disk that can be identified or designated for a
file. Also known as a cluster.
Alt the prefix used for the “Alternative” key. It is used like the shift key. The result
of using the Alt key will vary depending upon the software being used.
Alta Vista 8
amazon.com a commercial Website offering more than one million books and mu-
sic CDs. The company is determined to maintain a dominant position as an
online retailer through the expansion of services including auctions, electronic
products, toys, and more.
America Online (AOL) an online information service company that operates two
worldwide Internet services, with more than 22 million members, and
CompuServe, with more than 2.2 million members, several leading Internet
brands including ICQ, AOL Instant Messenger, and Digital City, Inc.
AMI (American Megatrends Inc.) The leading supplier of BIOS software used in
PC motherboards.
Amiga one of the first mass marketed PCs sold by Commodore Business Machines
in the 1980s using Motorola microprocessors.
analog data represented in a mode other than binary bits such as the image relayed
by a scanner. Analog data is represented by one or more of an infinite number
of points on a scale or continuum.
analog monitor a video device similar to television that can display an unlimited
range of brightness for each primary color. An analog monitor can display any
color a computer can generate.
angle brackets the characters < >. Used in writing many programs.
9 app
animation the use of moving images on a computer screen. At present, much of the
moving video we see must be called up from data stored on a disk or CD-ROM.
annie (orphan annie) a Website or particular Web page that has not been updated
in a long time.
anon server (anonymous server) a service provider that forwards email while con-
cealing the identity of the sender. Anonymous servers were initially designed
for users with a legitimate need for privacy, but have occasionally been used for
criminal or questionable activity such as spamming. see spam.
anonymous FTP a means for downloading public FTP (File Transfer Protocol)
files. Referred to as anonymous because there is no need for the user to identify
himself to access the files. see FTP.
antialiasing a method of eliminating the stair step properties called jaggies cre-
ated by the normal display of pixels on a computer monitor. Jaggies sometimes
appear when enlarging bitmap images using photo manipulation software.
API (Application Program Interface) a set of tools and/or procedures used for
building software applications. For example, operating software such as Win-
dows, allows that an API facilitates the smooth creation of new software by
designers to run compatibly with Windows.
APL a programming language invented in the 1960s using its own characters.
APL remains in limited use today.
Archie a type of search engine used to retrieve FTP files stored on anonymous
sites. The user must have the exact file name.
archival storage a comprehensive back-up system where all files are copied to one
of several possible data storage devices such as floppy disks, Zip drives, tape,
or Jaz drives.
archive a back-up system designed for the storage of files to be kept for long
periods of time. Some Websites that offer fresh information daily will allow
access to older files by making them available through a link to an archives
page. see archival storage.
arrow keys four command keys on the keyboard that move the cursor up down, left
or right. The arrow keys may be used as an alternative to the mouse.
Artificial Intelligence (AI) the attempt to use computers to think and reason as
humans. Among the functions of contemporary IA are, playing games, and
robotics.
ASCII file a text file in which each byte is represented by one character of the
ASCII code.
ASCII graphics sometimes called ASCII art, a technique for drawing, making use
of standard keyboard characters. ASCII art often uses the single character X to
create images. The character may be repeated line after line, thousands of times,
forming silhouettes and outlined forms. It was popular in the 1980s and was
sometimes used to create large banners or signs with perforated computer print-
ing paper. Best results are obtained when displayed in a fixed-pitch font. see
fixed-pitch type.
ASP (Active Server Page) a Microsoft system for developing Web pages. ASP is an
HTML document that contains embedded server-side scripting. Web servers
compatible with ASP can execute these server-side scripts. On the user side, an
ASP is a standard HTML document viewable using any Web browser. see
HTML.
assembly language programming language that is one step more complex than
machine language which is the lowest level programming language.
associate to designate that a particular file always be opened with a specific pro-
gram. Some files may only be opened with specific software while the user may
be able to choose one of several applications when opening certain files.
asterisk (*) the star shaped character on the computer or typewriter keyboard used
to mark a footnote. In many computer operating systems and applications an
asterisk is used as a wildcard symbol. see wildcard.
audit trail records maintained by certain programs showing the time and order
data was entered, ensuring the reliability of accounting and financial informa-
tion.
auditor an impartial third party company that counts and verifies banner ad deliv-
eries from a Website. An auditor may also verify the number of page impres-
sions and other user related statistics of a Website.
AUTO-BOT free software that lets you automatically perform scheduled tasks
such as check POP3 email, launch your email program, and download mail.
You can also use AUTO-BOT to set your PCs internal clock to an Internet time
server.
13 AWK
avatar a digital animated character used to represent your virtual position in chat
rooms. An avatar may be a cartoon character such as a cat, flower, choo choo
train, etc. In cyberspace, the user is represented by such a character.
AVI (Audio Visual Interleave) a Windows multimedia file which may be down-
loaded from the Internet, used for sound and video.
AWK a programming language, developed in the 1970s, used for scanning and
manipulating text files. AWK is an acronym for the last names of the develop-
ers of the language, A.V. Aho, P.J. Weinberger, and B.W. Kerningham.
B
b2b (business to business) a popular phrase that refers to a company either online,
brick and mortar (a physical location) or both, that specializes in providing
goods and services to other businesses and not consumers.
back the browser command button that returns you to the previously viewed page.
back door an alternative way of gaining access to a computer system. A back door
entry might be a programmed secret access into the system unknown to routine
users of the system.
back end the database to which information presented by the front-end application
connects. see front end.
background the field or setting against which characters or graphics are displayed
on a monitor.
background execution modern computers are capable of running more than one
program at a time. This is called multitasking. The program in use (primary
program) is said to be operating in the foreground. Secondary programs are
running in the background. For example, you might be writing a letter on a
11 BASIC
backlighting flat-panel display illumination from behind that causes the foreground
to appear more distinct in contrast to the background.
backup also written as back up, to copy or save a program or file for safe keeping
in the event the working program fails in some way or is lost. It is wise to back
up all files on floppy, zip disks, or tape. Many software applications periodi -
cally prompt you to save your work while you are actually working. However, a
usershould still backup all work on the computer’s hard drive in case of malfunc-
tion or failure.
bandwidth the quantity of data that can effectively be sent through a connection,
measured in bits-per-second. The greater the bandwidth, the faster the trans-
mission of information. High bandwidth also provides clearer images on a
computer’s display monitor while online.
bar chart (bar graph) a type of chart or graph that quantifies or measures relative
values represented by rectangular bars.
tions functioning today. BASIC is used for many business applications and
includes a great number of proprietary functions.
BAT file (batch file) a DOS or Microsoft file that ends with a .BAT extension.
baud a unit of measurement that represents the number of bits that can be sent or
received over a telephone line or via a satellite signal per second. Baud is actu-
ally the maximum number of times per second that the signal shifts value. For
example, a 56,000-baud modem takes 56,000-baud (56,000-bps) and encodes it
into an audio signal whose actual signal is 14,000. To keep it simple, remem-
ber that the higher the baud rate, the faster the transmission of data. The chal-
lenge is that telephone lines are limited in their ability to transmit these sig-
nals. The term baud is losing popularity to the more accurate “bps” meaning
bits per second.
bay (bay drive, drive bay) a site on a computer or portable disk drive where a disk
or tape drive may exist or be installed.
BBS (Bulletin Board System) a computerized meeting and chat system where sub-
scribers can exchange ideas and information, as well as upload and download
files. Since the early 1990s the functions of BBSs have been much replaced by
the Internet.
Bcc abbreviation for blind carbon copies. When composing email, the writer has
the option of sending copies to others so the recipients cannot see each other’s
email addresses and are not aware that copies are going to addresses other than
their own.
bells and whistles advanced features available on both computer hardware and
software. In the past, bells and whistles referred to features that made the com-
puter or program more difficult to use. Now, however, bells and whistles often
refer to desirable or state-of-the-art features.
beta (beta testing) software that is in the preliminary or testing stage where glitches
or bugs may still be undetected. Users involved in beta testing are often re-
17 block move
quired to run the application extensively and record findings such as ease of
use, and any problems encountered, and report back to the developer with sug-
gestions as to how the software might be improved.
binary a number system that uses two distinct digits. Computers use the binary
number system which is comprised of the numbers 0 and 1. Digital data of
every imaginable type is encoded using the binary system.
BinHex a method for converting binary data into ASCII. see ASCII.
BIOS (Basic Input Output System) built-in software that controls a number of
routine functions of a computer such as the display screen, keyboard, disk drives,
and the real time clock.
bit bi(nary) digi(t) the most basic unit of data in the binary numeral system.
Computers are often classified by the number of bits they can process at one
time.
bit bucket a slang term that refers to the unknown place where lost data goes,
never to be recovered.
BITNET a large area-wide network originating in the early 1980s used to transmit
email among university scholars and researchers.
bits per second (bps) a unit of measurement that counts the number of bits that
can be sent or received over a telephone line or via a satellite signal per second.
Modem speeds are measured using bps. see baud.
bloatware a slang term used to describe software with elaborate features requiring
large amounts of disk space and RAM.
block move in word processing, the moving of one section of a file to another
location within the file, or to an entirely different file. This is accomplished by
board 18
highlighting the desired text, copying the highlighted material and pasting it
to the new location.
board 1. short for a printed circuit board. 2. a bulletin board system or chat forum.
bold (boldface) a font that is darker than the normal. Contemporary word proces-
sors allow a user to change a font to boldface with the click of a button. For
example, this is normal print. This is boldface print.
bookmark a feature on a Web browser that allows the user to store one or more
favorite Websites or URLs, save them in a folder, and have them readily
accessible by a couple of simple mouse clicks. Bookmarks are also referred to
as Favorites.
boolean (boolean logic) a system of locating and retrieving computer data by the
use of certain words such as AND, OR, XOR and NOT.
bot slang expression for robot, a program that runs automatically. Among the uses
for bots are to locate information on the World Wide Web and for the automatic
collection of email addresses.
bounding box (box) an invisible enclosure surrounding a graphic that allows the
user to manipulate the image with handles represented by small black squares.
It also determines the true size of the image.
brittle usually refers to software operating reliably yet subject to sudden malfunc-
tion quickly, under even the slightest change in conditions.
broken hyperlink (broken link) a link on a Web page that, for any number of
reasons no longer points (connects) to a another page. see dead link.
browser (Web browser) a software application that retrieves Web pages or files on
the World Wide Web. Web browsers are the programs that allow users to call
for and view information online. Popular Web browsers a include Microsoft
Internet Explorer and Netscape Navigator.
bug an error or malfunction in a computer program. Recently the term has taken on
a broader meaning referring to almost any problem having to do with both
software and hardware.
bundled software software sold as part of a package either with a computer or with
other software. For example, most PCs come equipped with the most recent
version of Windows while Microsoft Office consists of individual programs
that compliment each other and are less costly packaged together.
burn 16
burn slang term referring to the copying or recording of data on a CD-R or floppy
disk.
bus the configuration of wires and electronic channels through which data is trans-
mitted inside a computer.
byte the space required in a computer to store a single character. In modern com-
puters a byte is usually equal to 8 bits. The main memory space or hard drive in
a computer is now measured in Gigabytes (GB), one GB being the equivalent
of approximately one billion bytes.
C
cable modem a modem that sends and receives data over television cable lines.
Cable modems typically transmit data faster than telephone connections.
cache can be used as a noun or a verb. As a noun, a data storage reserve where
information may be held and called up quickly. As a verb, cache means to store
data temporarily until it is called upon by a user. Web browsers cache pages so
they do not need to be downloaded from the Internet each time you access the
page. Cached data is stored temporarily in a computer’s main memory or a
specially designated memory storage space within the microprocessor.
CAD (Computer Aided Design) the use of both hardware and software for design
work such as architecture as well as a wide variety of engineering functions.
CAD applications are used to generate three-dimensional images.
camera ready desktop publishing documents that are ready for the printer.
cancel to completely halt a command. The cancel button appearing at the bottom of
most dialog boxes (Windows) makes it difficult to make an error because you
can easily back out of a function by clicking on it.
cancelbot a program left running on a Web server that automatically deletes mes-
sages on newsgroups and message boards. A cancelbot application is often
used to filter out spam. see spam.
caps 22
caps short for capital or uppercase letters such as these: CAPS. Sending email or
posting online in a public forum such as a news group or message board in all
caps is considered to be shouting and rude. It also makes the message hard to
read. see uppercase.
Caps Lock a key on the left side of the keyboard that, when pressed allows a user
to type in caps without depressing the Shift key. When finished, press it again
to deactivate it.
carbon copy a copy of an outgoing email saved by the sender. see Cc.
card a printed circuit board that adds additional features to a computer such as
video or audio. A card is usually easy to install both internally or externally
because of its ability to be plugged in.
CASE (Computer Aided Software Engineering) the use of computers to help with
the development of software.
case short for nutcase. A regional slang expression for the “Randy” factor. In the
Northeast, “Randy” (last name unknown) was an early pioneer in hacking.
case sensitive to distinguish between capital letters (UPPERCASE) and small let-
ters (lowercase). Many Internet logon keys, codes, and passwords are case
sensitive and must be entered properly or the user will be denied access. For
example, ABC would be different than abc.
catalog a somewhat dated term for the contents of a disk. see directory.
CAV (Constant Angular Velocity) a constant disk rotation speed whether data is
being accessed from the outer edge of the disk or nearer the center.
Cc abbreviation for carbon copy. The double letters refer to copies. When used in
an email header, Cc indicates that copies of the message are being sent to more
than one address. see Bcc.
CCD (Charge-coupled Device) devices used for the electronic recording of im-
ages. CCDs are used in digital cameras and scanners.
23 center
CD (Compact Disc) a plastic disc with a metal finish, developed in the 1980s,
capable of storing digitized music. A CD stores data on a continuous groove,
much like a phonograph record. One CD can store up to 74 minutes of music.
see CD-I, CD-ROM, CD-RW.
CD-I (Compact Disc Interactive) a compact disc that stores and makes available
audio, video and binary data. Developed as a joint venture of Phillips and Sony,
the CD-I standard has not been widely accepted.
CD-R (Compact Disc Recordable) a compact disc that can be used for recording.
These are readable the in same way as regular CDs.
CD-ROM (Compact Disc-Read Only Memory) a disc with identical physical char-
acteristics as a music CD, only containing computer data. Unlike a music CD,
a CD-ROM can store both computer data and music. CD-ROM drives are able
to read the data on a disc, but not record, thus the “read only” designation. The
data storage capacity for a CD-ROM is nearly 700 megabytes, enabling it to
hold extremely large amounts of data.
CD writer a device that allows a user to record (burn) data using a CD-RW. A CD-
RW drive allows for the backup of music CDs as well as software applications,
photos and individual files.
center to align text, graphics or images in the middle of a page with equal space on
either side.
central processing unit 24
chat interactive online communication held in real time where users type messages
back and forth. There are an increasing number of online forums being made
available for chat. ICQ chat and Microsoft Messenger offer free chat software.
There are many chat programs available that enable users to chat using voice
technology.
chat room any of a large number of Websites or newsgroups where users can
communicate using a keyboard in real time on a wide variety of topics ranging
from oceanography to sex, politics, and much more. If you can come up with a
topic, there’s probably a chat room for you.
check box a box offering particular options that the user may choose or reject.
clickonus
chip a small integrated circuit usually made from silicon or germanium that may
hold millions of electronic components. Among the many chips used in
computer hardware are microprocessors and memory chips.
25 clip art
Cisco Systems a major hardware manufacturer that creates hardware and software
solutions that link computer networks so that people have easy access to infor-
mation without regard to differences in time, place or type of computer system.
click to press the left mouse button and immediately release. Some computer func-
tions require that the user double clicks. see double click.
click and mortar a business with a physical business location (brick and mortar)
that attempts to establish a presence on the Internet to offer its goods and ser-
vices.
clickable image an image on a Web page that contains an invisible hyperlink that
directs the user to another page.
clickstream the path a user takes while navigating through cyberspace, or more
specifically, through a Website. Software is available to track this activity. Fol-
lowing a user from Website to Website is valuable information to online adver-
tisers as a measurement of advertising effectiveness.
client a computer that receives services from another computer. For example, the
computer running the Web browser you use when accessing the World Wide
Web is the client of the Web server delivering the Web documents.
clip art artwork available on floppy disk and CD-ROM as well as on the World
WideWeb in several file formats to use without the need to pay royalty fees.
The creator is paid for the work by either producing and distributing it himself,
or receives payment at the time a deal is struck with a publisher. The publisher
then goes on to charge end users a licensing fee. A wide selection of clip art
is available on numerous Websites free of charge. see Figure C.04.
Clipboard 26
Clipboard a useful tool that acts as a temporary storage space holding informa-
tion (both text and graphics) you’ve cut or copied until you are ready to paste
it to it’s final destination. In Windows the images or text vanish when the
computer is turned off. Macintosh has both a Clipboard that operates in the
same way, and a Scrapbook that holds more than one image at a time, and
saves held material from one work session to another.
clock the component within a computer that keeps track of the date and time. see
BIOS.
clock rate (clock speed) the speed that a computer’s microprocessor is able to
process information, usually measured in MHz. see microprocessor, CPU.
clone a computer or software program that functions exactly like another. A clone
is often a less expensive imitation of the original. The term became popular
after IBM set the standard for personal computers and rival manufacturers
imitated the IBM PC.
CLV (Constant Linear Velocity) in older disk drivers, the changing of the rotation
speed in relation to where the data is stored. Because less information is lo-
cated close to the center of the disc, it needs to turn faster to access the data.
CAV (Constant Angular Velocity) is rapidly replacing this technology. see
CAV.
CMYK (Cyan, Magenta, Yellow, Black) the four standard ink colors from which
all other printed colors are derived. see color printer.
coaster a slang term used for give-away CDs such as those one might receive in the
mail as promotional offerings.
27 command
coaxial cable a cable consisting of a single wire in the center surrounded by insul-
ation and grounded with a braided conductive shield. The shield is designed to
prevent the cable from receiving or emitting electrical noise. Coaxial cable is
used for cable television and the networking of computers.
cold fusion a tool developed by Allaire Corporation that integrates browser, server,
and database technologies for rapid application development and Website de-
sign.
COM short for communications, a term generally used to describe the serial port
on a PC.
.com an Internet domain designation given to URLs that are commercial, or per-
sonal in nature. see domain, URL.
COM port the location of a socket on the back of a computer for connecting
accessories such as printers or modems.
special keys, menu choices, buttons, and by voice with the use of voice-acti-
vated software applications.
!
Figure C.06. command key
commerce server a special Web server designed to process credit card transac-
tions.
compatible having the ability to function together. In order for software applica-
tions and certain hardware devices such as printers and modems to operate,
they must be compatible with a computer’s operating system and other system
hardware.
compression the storage of computer data so it requires less disk or file space.
Compressed graphics files allow significantly quicker loading time on the World
Wide Web. see data compression.
computer ethics an unwritten code of conduct for computer users. The point to
remember here is, users have the same legal responsibilities using computers
that they do at any other time. Computer ethics has a long way to go before
solid guidelines or mandates are officially determined. Questions of privacy,
intellectual property ownership rights such as copyrights and licenses, and
conduct regarding the use of computers to send bulk email are among the many
issues requiring resolution.
computer literacy the level of skill an individual has with computers and com-
puter applications.
computer science the extensive study of computer design including both hardware
and software applications.
computer security the effort to protect computers from physical danger, malicious
tampering and the undesired disclosure of information. Accomplishing these
ends encompass a wide array of measures from the actual physical protection
of computer hardware, to the guarding of data through the use of firewalls,
encrypted information, passwords, and access codes.
conferencing the use of a computer network where users are able to communicate
in real time.
connect to go online.
connect time the amount of time spent online during one or more computer ses-
sions.
content provider usually a free online service provider offering a wide variety of
services such as news, weather, stock quotes, entertainment, games, discussion
forums and more. see online service.
contrast the intensity and clarity of light and dark values while shown in grayscale
either on a display monitor or a printer. The use of distinct black and white
values represents high contrast while the use of gray shows lower contrast.
Control key the keyboard key labeled Ctr, used like the shift key in that it changes
the function of other keys. On the Macintosh the Control key is called the
Command key or the Apple key.
Control Panel an application that allows the user to set many individual features
on a computer such as keyboard and mouse settings, power management, mon-
itor and many system settings. In Windows, the Control Panel can be accessed
by clicking on the Start button and then Settings. From the Desktop the path
would be, My Computer and Control Panel. For the Macintosh, access can be
found under the Apple menu.
conversion program an application that changes a file from one format to another.
cookie a piece of data such as logon and user information, user preferences, and
shopping information automatically sent by a Website through a Web server
and stored by a Web Browser. It is the intent of the Website sending the cookie
to recognize a user who has visited them in the past. On subsequent visits, the
information contained in the cookie returns to the originating site, allowing
the operator to offer specific products and services tailored to the user’s prefer-
ences as determined by previous visits. Due to certain privacy issues regarding
the gathering of personal information, users sometimes have the option of dis-
abling cookies.
CoolTalk a real-time desktop audio conferencing and data collaboration tool spe-
cifically designed for the Internet. CoolTalk provides real-time audio
conferencing at 28.8K and faster modem speeds, and includes a full function
whiteboard, text-based chat tool, and answering machine.
copy protection various methods used mainly in the 1970s and 1980s to keep users
from making unauthorized copies of software programs on disk. The drawback
to copy protected software is that making a backup copy becomes difficult if
not impossible. Under US Copyright law, users are allowed to backup disks.
Consequently, software manufacturers have tried to discourage piracy by re-
quiring that the user enters a registration number when installing the program.
copyright the right to copy, a legal restriction of the reproduction of written, re-
corded, and electronic articles, books, audio and video recordings, and most
computer software programs. The copyright is intended to protect the author’s
rights of ownership of the work. An author need not register a work with the
US Copyright Office to be protected under the law. Technically, simply declar-
ing that a work is copyrighted by publishing it with © and the date is enough,
however, official registration with the US Copyright office may prove to be
prudent. The copyright symbol is common and appears as follows:
The User Friendly Guide to Internet & Computer Terms Copyright © 2001
Gold Standard Press Inc. All rights reserved.
Courier a typewriter-like font used on typewriters, inkjet, dot matrix, and laser
printers. This is an example of courier.
CPU (Central Processing Unit) sometimes referred to as the brains of the com-
puter, the CPU is where the majority of the mathematical calculations, decod-
ing of data, and the execution of coded instructions occurs. In personal com-
puters the central processing unit resides in a single chip called a microproces-
sor. When someone refers to the speed of a computer, the reference is to the
CPU and is measured in megahertz (Mhz). see microprocessor, processor.
cracker a person who gains unauthorized entry into a computer or computer sys-
tem through the Internet and copies commercial software, sometimes simply to
see if it can be done and sometimes for financial gain. In certain circles, a
cracker would be considered less proficient than a hacker, though the terms are
often interchangeable. see hacker.
crash a sudden and serious computer failure due to either a hardware or software
malfunction, usually resulting in a loss of unsaved work. Among the many
reasons for a computer to crash are running too many programs at once and
crawler 32
crawler a program that searches the Internet seeking publicly accessible informa-
tion and Web documents. The information might be stored in a database and
made available through a search engine. Crawlers are also known as spiders,
bots and wanderers. see spider.
crippleware free software that has one or more features left out. Manufactures
make this available hoping that users will buy a fully functional version.
cross-post posting the same message in a number of different public forums simul-
taneously, sometimes with the use of special software. In some cases (such as
with commercial offers) cross-posting is called spamming and considered bad
netiquette. see spam.
CRT (Cathode Ray Tube) a glass vacuum tube in which an electron beam or ray is
projected onto a florescent screen to produce a luminous image or picture.
Television and computer screens are CRTs.
cryptography encoding data in such a way that it may not be understood by per-
sons or computers without an authorization key or code.
Ctrl-Alt-Del pressing these keys together quickly halts all computer functions. A
dialog box will appear asking the user if she wants to shut down the present
application. Contrary to common belief, pressing these keys together does not
shut down a computer.
cursor a blinking I-beam shaped symbol on a computer screen showing the user
where the next character or object will appear. Depending upon the program
running, a cursor might also show as an arrow or a hand. The cursor can be
manipulated by using either the keyboard or the mouse. see mouse cursor.
cut to remove either text or graphics from an application and save it in a temporary
holding area or buffer sometimes called a clipboard.
cut and paste to identify and isolate an element of a document and eliminate it
from a particular location, then replace it by moving it to another location
within or outside of the document. see copy, copy and paste, paste.
Cybertown a virtual community set in the latter half of the 21st Century that may
be accessed through the Netscape Web browser, Netscape Navigator.
cycle the unit of measure which is a single oscillation of a computer’s CPU clock.
Programs running concurrently are competing for cycles.
Cyrix 30
data information. Though the word data represents the plural, in common usage it
may indicate either the singular or plural.
data compression the storage of data so that it requires less space than it might
otherwise. There are many methods of data compression. For example, rather
than write a string of 60 of the same characters, a programmer would write,
“the following character is repeated 60 times.” Data compression is especially
useful when transmitting graphics via a modem because it allows the image to
load more quickly.
data mining data mining uses complex algorithms to search large amounts of data
and find patterns, correlations, and trends in that data. A data-mining applica-
tion can create a model that can identify buying habits, shopping trends, credit
card purchases as well as perform many non-commercial functions.
data processing usually a reference to software that enters, sorts, categorizes and
stores information for easy recall.
dead link a Web page that no longer exists, prompting an error message. A dead
link may be the result of a Website that has ended operations or moved.
deadlock an occurrence where two computer processes are waiting for the other to
finish, keeping each from proceeding.
dedicated designated for only one use. For example, a telephone line in an office
may be dedicated only for use by a fax machine or a single network computer.
dedicated host a Web server that stores and delivers the documents that make up a
single Website. A dedicated host is the opposite of a virtual host, which refers
to a server that stores and delivers the Web pages of many sites. Dedicated
hosting helps to ensure that a Website will always be available to users because
its server has the sole purpose of maintaining and delivering one and not
many sites.
37 desktop publishing
default drive the drive the computer automatically uses unless another is selected.
default browser the Web browser that will automatically retrieve Web pages when
you log onto the World Wide Web. For example, a computer may have both
Netscape Navigator and Microsoft Internet Explorer installed, but always opens
Navigator because it is set as the default browser.
degauss to demagnetize.
Deja News a search engine used primarily to search the Newsgroups. see search
engine.
Del the Delete key on a computer keyboard. The Del key eliminates items selected
on the display monitor.
denizen slang term for an inexperienced, unsophisticated individual who serfs the
Web.
desktop everything appearing on your computer screen at any given time. The
desktop in a Windows system with no programs running, usually displays icons
that represent shortcuts to opening specific programs. see icon, shortcut.
desktop publishing the use of a personal computer to design and produce profes-
sional quality printed documents. There are hundreds of software programs
available allowing users to typeset and place illustrations and photographs in a
wide variety of printed materials from brochures and manuals, to books and
posters. Among those highly rated by both home users and individuals in the
publishing industry, are Adobe PhotoShop and Adobe PageMaker.
dialog box 38
dialog box a window appearing on the screen offering the user information or
options as to the next step in the present application. For example, when set-
ting up the layout for a document in a word processing program, a dialog box
is available offering the user options on the size and style of the font, margins,
and possibly the color of the text.
digital information encoded and expressed with the use of binary numbers repre-
senting many values in the real world. Digital information is distinguished by
the fact that only pre-determined values may be represented using zeros and
ones. For example, a digital thermometer would display the temperature using
pre-assigned values. On a digital thermometer, the temperature might read
76.2. The next higher reading available might be 76.3. The true temperature,
however, could range anywhere between 76.2 and 76.3, such as 76.21, .22, .23
etc. The possible values existing between 76.2 and 76.3 are infinite, but the
thermometer, limited by design, can only display pre-set values. Consequently,
pinpointing exact values represented by digital data is virtually impossible.
Though limited in this way, digital information has many advantages because
extremely close approximations are easily achievable. Digital data is also easy
to store and manipulate. Opposite of analog.
digital camera a camera that encodes images without the use of film and records
them directly to a disk or a computer.
digital cash a system for the payment of goods or services online or otherwise by
transmitting encrypted data from one computer to another usually through ar-
rangements with a bank.
39 disk
digital computer a machine that expresses data using a system of pre-set values.
Digital computer representations can be broken down to simple binary expres-
sions. All modern computers are digital as opposed to analog computers which
would express values as individual points on a continuum. A slide-rule would
be an analog computer.
digital-to-analog converter a device that converts digital data into analog signals.
digitize to convert information into digital form. For example, optical scanners
achieve digitization by converting images into bitmaps.
dir (directory) in the operating systems DOS and OS/2, the command that calls up
all the files in a particular directory.
directory also called folder, an inventory of all the files contained in a specific
section of a computer disk. A disk may contain more than one directory and
directories may contain other directories. see folder.
discussion group a group of people exchanging ideas and thoughts online encom-
passing a wide variety of topics of interest either in a chat room, interactive
live chat, message board, or some other public discussion forum.
disk a round flat platter used for the storage of computer data. The hard disk (the
primary storage device) is usually, though not always, a permanent (internal)
part of a computer. Optical disks, such as CD-ROMs, and diskettes are por-
table disk storage devices.
disk drive 40
disk drive a device that allows a computer to read the information on a disk. PCs
usually contain a hard disk and one or more disk drives for the reading of
CD-ROMs and diskettes. see disk.
diskette sometimes referred to as a floppy disk. A round, flat, portable device used
to store computer data.
docking station a fixed location that makes accessories available to a laptop com-
puter. These might include a permanent power supply, a printer, or a scanner.
document a file usually created using a word processing application, which con-
tains one or more of the following: text, graphics, tables, or charts.
DOS (Disk Operating System) refers to any operating system, but has been mainly
identified with Microsoft or MS-DOS. MS-DOS was first developed by Microsoft
Corporation as the operating system for IBM personal computers.
dot com the American designation for a commercial or personal Website, such as
http://www.kokobono.com.
41 DSL
dot matrix printer a printer that creates forms and characters by means of pins
striking an inked ribbon.
double click to press a mouse button (usually the left) two times in quick succes-
sion to start a program or initiate a command.
down unavailable for use. A term with a broad-based meaning, referring to a com-
puter, a network, an ISP, a Website, or almost anything related to computers
and their many uses.
download to copy or transfer data from one computer to another. Technically speak-
ing, every time you view a Web page you are first downloading material from
that Website’s server. Among the many advantages of being online are the wide
variety of free software available for users to download.
dpi (dots per inch) the number of dots or pixels located within a linear inch. The
higher the dpi, the better the clarity or resolution.
drag and drop a classic feature of the graphical user interface, the ability to click
on a file, text, or a graphical image and deposit it to another location. The drag
and drop features in both Windows and the Macintosh make many computer
functions more manageable. see graphical user interface.
drive bay a port or access space on a computer that can accommodate a disk drive.
drop-down menu a list of selections or options that appears when a user clicks on
an item such as File or Help.
DSL (Digital Subscriber Line) the use of existing copper telephone lines for high
speed data transmission such as Internet connections. Like a leased line, a
DSL must be configured to connect at two specific locations. see SDSL.
DSS 38
dump the transfer of raw data, usually from a computer’s main memory, for display
on a printer or a monitor.
DVD (Digital Video Disc) a high-density CD with more than seven times the
capacity of a regular CD (enough capacity for a full length movie). Most DVD
drives are also able to read CD ROMs.
e-book a book available for downloading to a computer via the Internet. Stephen
King recently made Riding The Bullet, a short horror novel, available free on
amazon.com. In some cases, special software such as Adobe Acrobat is
required to accommodate the material. The possibilities with e-books are enor-
mous as information requiring periodic updating (such as college textbooks)
could be easily published online and downloaded by students as needed.
e-commerce short for electronic commerce. A business that offers goods and ser-
vices, as well as having the ability to accept payment for them, online. Many
conventional brick and mortar companies are presently scrambling to establish
an online presence and capitalize on the hoopla associated with being an e-
business.
Ecash a proprietary online system of payment offered by the Mark Twain Bank
where a user first deposits money with the bank and then, using software pro-
vided by Mark Twain, may make purchases online, debiting the account ac-
cordingly.
ECP (Extended Capabilities Port) a kind of parallel port for PCs that allows for
rapid bi-directional communications with devices such as a printer.
ecruiting 44
edit to make changes in a file using one or more of the edit features available in an
application.
effector key a key, such as the Shift key, that when pressed, changes the function of
another key.
electronic mall a virtual shopping mall where the user may browse and shop online.
Many Internet business opportunities offered by various promoters allow en-
trepreneurs the chance to purchase a storefront, which is the entrepreneur’s
exclusive entry to an electronic mall. Under this plan, many individual store-
front owners have an entry to the same mall. Using this business model, it is
the storefront owner’s responsibility to promote the site and drive shoppers to
the mall. For online shoppers, using a mall may offer the ultimate in shop-at-
home convenience, however, as with any other shopping experience, evaluat-
ing a wide range of goods, services, and prices is wise.
elevator bar an onscreen scroll bar located on either side of a window frame or on
the bottom of the frame that allows a user to view the part of the document too
large to display otherwise. The bar is activated by placing the mouse cursor on
it and clicking. This moves the page either up and down or from side to side.
The same function may be accomplished by using the arrow keys on the key-
board. see scroll bar.
email (e-mail) short for electronic mail. The transmission of messages both per-
sonal and commercial using a special program over a network. Email is an
easy, convenient, and virtually free (at present) way to communicate using a
computer within a business environment, across town, or around the world.
Messages may be read immediately upon receipt, saved, or printed. The term
email can be used either as a noun as in, “I received an email from the presi-
dent today,” or as a verb, “I’ll email her tonight and set up a time for our
meeting.” There is some discussion as to the proper spelling of the word, but
email, without the dash, seems to be emerging as the more common choice.
Email, along with other online communication forums has prompted the devel-
opment of many clever abbreviations and acronyms.
email address distinguished from a domain name by the at sign @, a name that
identifies an electronic mail recipient such as travelinguy@hotmail.com (one
of the author’s email addresses).
embedded font a type style that is included within a file to ensure that the printer
has the proper resources available when the time comes to reproduce the docu-
ment.
embedded object an object included in a file that was created using a different
software application, yet still has a link to the authoring software.
End key a keyboard key that has different functions depending on the program
running. For example, in some word processing programs pressing the Ctrl-
End keys provides a shortcut to the end of the document. see Special Key
Functions, page 281.
end user the individual or company intended as the ultimate user of a computer or
software product.
Enter Key the keyboard key that moves the cursor to the next line. It also initiates a
function or command. For example, when a program displays a prompt such as
Save, pressing the Enter key confirms the command. Pointing the mouse cursor
to the Save button and left clicking would accomplish the same function. see
Return key, and Special Key Functions, page 281.
Escape key a keyboard key usually labeled Esc. In the Windows environment,
pressing the Escape key sometimes ends the present function and returns the
user to the previous function. The term sometimes is used here because at other
times, pressing Esc does absolutely nothing. This usually means more dra-
matic measures must be taken to end the function. see Special Key Functions,
page 281.
etailing (electronic retailing) using the Internet to sell goods and services. see e-
commerce.
Ethernet a local area network (LAN) first developed by Dr. Robert M. Metcalfe
and D.R. Boggs while working for Xerox in the 1970s. Transmission of data
takes place by radio signals broadcast over one of several types of coaxial cable.
see LAN, LAWN
Excite a popular Internet search engine that indexes more than 50 million Web
pages. Excite also reviews selected Websites and rates them using a 5 star
system.
EXE file the .EXE suffix tells the computer to open or execute a particular file.
exit to quit the present application. Most applications programs prompt the user to
save work before exiting.
expansion board a printed circuit, sometimes called a card, that can be plugged
into a computer giving it enhanced capabilities such as audio and video. see
SCSI.
Explore a component of the Windows 95, 98, and 2000 operating system that
allows the user to view the system’s directory. Explore is the equivalent of the
File Manager in earlier versions of Windows. To activate Explore, right click
on the Start button, choose Explore and left click the mouse.
browsers supporting a wide variety of graphics including Gif, Jpg and Tiff. It
also allows the user to bookmark favorite Websites and includes an email pro-
gram called Outlook Express. Free upgrades for registered users of Internet
Explorer are available for downloading on the Microsoft Website.
extension the suffix or the characters following the period in a filename such as
mountain.jpg. This file might be a photograph (or other graphical representa-
tion) of a mountain in the form of a bitmap. The name “mountain” indicates
that the file contains the image, and jpg indicates the type of file, which in
this case is a bitmap. The software application a computer is currently running
must be configured to execute particular file formats or they will be rejected.
see page 285 for a comprehensive list of filename extensions.
external viewer a program associated with a Web browser that allows the user to
look at an image or graphic presented in a particular format. Adobe Acrobat is
an external viewer.
extranet the linking of two or more intranets via the Internet primarily for the
purpose of sharing mutually beneficial commercial information.
fair use under US copyright law, the limited reproduction of copyrighted material.
For example, quoting several passages from a book for use in a review or to
emphasize a point in an article would probably be considered fair use by most
publishers.
fatal error an occurrence that takes place for any number of reasons while operat-
ing a computer that often causes the system to crash, resulting in the loss of any
unsaved work.
fax modem a computer device that allows for the transmission and receiving of
documents as faxes. As a rule, the quality of a fax received via a computer will
be consistent with the quality of the printer ultimately printing the document.
A fax modem may be installed inside the computer or present as an external
modem. Some fax modems also function as regular modems.
Fetch a Macintosh program that transfers files using file transfer protocol (FTP)
from a computer to a server or from a server to a computer. This is one of the
ways that Web pages are loaded from a Web designer to the server that offers
them to users via the World Wide Web.
fiber optics 50
fiber optics the use of glass or plastic fibers for the electronic transmission of data.
The technology has several advantages over traditional wire cables in that trans-
mission speed is greatly increased; fiber optics allow for greater bandwidth
with no electromagnetic noise; fiber optic cables can carry more data; they
transmit the data digitally; and they are lighter and thinner than wire cables.
file a compilation of data stored on a computer disk, identified by a name called the
file name. Almost all data is stored in some type of file. A file has a first and
last name and may contain an entire program or a single document. see page
285 for a comprehensive list of filename extensions.
file format a method for encoding or arranging data in a file. Every program uses
a particular format for organizing the information in the files they produce. For
example, text is arranged differently than images or graphics. That is why most
word processing programs cannot display photographs.
file recovery when deleting a file from a disk, the space it occupied is not actually
overwritten until it is needed for new data. Therefore, in some cases it is pos-
sible to retrieve the deleted information. Some files created using Windows
applications may be resurrected by going to the Recycle Bin, clicking on the
file you wish to bring back so it is selected or shaded, then clicking on “Restore
File.” Files created by programs other than Microsoft, may be restored with
software available from several software companies, such as Norton Utilities.
filter 1. software that takes data and transforms it in some way, such as converting
files in a particular format to another. 2. in image processing programs, a filter
is a tool that modifies an image such as a bitmap.
find an operating system command that searches particular directories for files
with specific attributes.
finger Unix software that weeds out information (particularly email info) about an
Internet user and returns the data to the requesting party. This might include
the user’s full name and whether he is online at the moment. Due to abuse by
commercial mass emailers, Unix systems now ignore many finger queries.
Firetalk an online realtime chat service that allows users to communicate with
other registered users anywhere in the world verbally. The service also offers
teleconferencing, voicemail, instant messages, and a realtime chat service for
Websites.
51 floppy disk
fixed-pitch type a font in which each letter has the same width and requires the
same amount of space.
flame war any type of online discussion that turns to a vigorous exchange (often
from many sources) of insults and angry remarks. Some of the more popular
stock message boards have been known to play host to heated flame wars.
floppy disk a portable magnetic storage disk, the term is somewhat of a misnomer.
The 5 1/4 inch storage disk used in early model PCs was flexible, thus called a
floppy disk. Today, the most common portable disk still called a floppy is the 3
1/2 inch variety. Unlike the earlier 5 1/4 inch version, the 3 1/2 inch floppy is
rigid, but the name floppy has managed to stick. Floppy disks usually store 1.44
MB of data. see Figure F.02.
Flooz 52
Flooz slang word for money in ancient Persia, a means of monetary exchange
online. Flooz is being touted as the online gift currency. For example, you could
purchase $50 in Flooz and give it to a friend as a gift (or keep it for yourself).
Your friend would then have $50 in buying power at online Websites that ac-
cept it.
flush text or images aligned along a border or margin. For example, the terms in
this book are flush left, or lined up in a column against a left border.
folder an object within a software application that may contain files and/or other
folders. The use of folders can be helpful in the organization of data stored in a
computer. see directory.
font a particular lettering style that incorporates size, spacing, and pitch. Word
processing programs offer many different fonts. The default font in many writ-
ing programs is Times New Roman.
footprint the space on a physical desktop (as opposed to a computer screen) that a
device such as a computer or printer requires. The term is borrowed from the
construction trade, where a footprint often refers to the space a house or build-
ing will occupy on a piece of land.
form an online document designed to accept feedback from a user. A form contains
fields where the user can enter name, email address, telephone number and
other information. After completing a form a simple mouse click sends the
information to the requesting party. Online forms minimize the number of pa-
per documents needed for a wide variety of purposes such as product warranty
registration, entering contests, and requesting information.
53 frame
FORTRAN (Formula Translator) developed by IBM in the late 1950s, one of the
first high-level program languages, used primarily for scientific calculations,
which remains in use today.
forward a command button on a Web browser that allows a user quick access to a
Web page. The forward button works only if the user has first clicked the
“back” button. In this case, the forward command allows the user to re-visit a
previously viewed page.
fragmentation the condition on a disk in which files are scattered around the disk
in pieces. The computer is still able to read the files but not with optimum
efficiency. Disk fragmentation occurs from the continual deleting of many files
over a period of time. Modern operating systems contain applications that defrag
disks when directed by a user. These programs should be run periodically.
frame describes the physical format for viewing a Web page offering the user the
ability to scroll up, down, or horizontally as needed. Frames may be divided
into two or more sections with each frame allowing the user options for scroll-
ing, as well as other methods for manipulating the frame, such as minimizing
or maximizing the view.
freeware 50
freeware free software available for downloading from a wide variety of Websites.
There are several reasons the software is offered free. Freeware, also sometimes
erroneously called shareware, is a limited version of a program that the manu-
facturer, distributor or author would like people to purchase. Giving users a
free taste is designed to get them to buy a more comprehensive version. An-
other reason an individual might offer free software on the World Wide Web, or
free anything for that matter, is to drive traffic to a particular Website. Online
revenues are often generated by site traffic, and giving software away is a popu-
lar way of getting visitors. Finally, some people simply want others to experi-
ence their creation and are willing to distribute it freely to accomplish that end.
front end a user interface which facilitates communication with another computer,
or the working aspect of an application.
FTP (File Transfer Protocol) a common method for moving files from one com-
puter to a another over a network. Utilizing FTP is a common way for Web
pages to be uploaded to Web servers by their creators.
FTP site a Web server that makes FTP files available for downloading. see anony-
mous FTP.
full duplex the transmission of data in two directions at the same time such as on a
telephone. Most modems operate this way.
function keys the upper row of keys on the main portion of the keyboard labeled F1
through F12. The function of each one depends on the program running. see
Special Key Functions, page 281.
fuzzy logic a conclusion reached by a computer recognizing that all values are not
absolutes such as yes or no, black or white etc. Fuzzy logic makes calculations
considering values in varying degrees between absolutes. For example, a com-
puter might recognize black and white as absolutes, yet make an evaluation
based on a shade of gray, which is somewhere between.
G
garbage in garbage out (GIGO) a somewhat dated phrase meaning the conclu-
sion reached by a computer can only be as good as the quality of the data that
was used to reach the conclusion.
Gateway Inc. a direct marketer of personal computers and related products and
services. Gateway develops, manufactures, markets, and supports a broad line
of desktop and portable PCs, servers and workstations used by individuals,
families, businesses, government agencies and educational institutions.
geek short for computer geek. A term used to describe an individual, usually male,
with an inordinate enthusiasm for computers and software, who sometimes
neglects other routine activities of daily living such as eating and bathing.
giga (G) derived from the Greek meaning giant, a metric prefix meaning
X 1,000,000,000.
gigabyte approximately one billion bytes. Actually 1024 megabytes. Modern com-
puter manufacturers usually measure hard drive storage capacity in gigabytes.
gonk slang term used in online chat rooms, bulletin boards, and other public for-
ums, meaning to embellish or tell an outright lie.
.gov a domain name suffix that indicates the Website is operated by one of the many
arms of the federal or state governments.
graphics card a plug-in video circuit board containing memory that allows a com-
puter to display graphic images as well as text.
grayscale the use of various shades of gray along with pure black and white to
produce an image.
hacker though the term has been associated primarily with people who endeavor to
violate computer or software security in some manner, the primary definition
refers to an individual who is exceptionally skilled as a computer programmer.
The other common meaning for the word is someone who gains unauthorized
entry into a computer system or software program for the sake of mischief or
financial gain. In light of many of the malicious deeds and pranks being
played of late, such as the malicious introduction of viruses via email, and the
intentional crippling of large Websites such as Yahoo, the accepted use of the
term is unfortunately becoming negative. see cracker.
half duplex the transmission of data in only one direction at a time. see full duplex.
hand icon the image the mouse cursor takes on when it is pointed to a hyperlink.
handle a name used in a chat room, bulletin board or other online discussion
forum. For example, Marjie’s online handle is Fidgetywitch.
hang a kind of computer crash that makes communication between the keyboard
and computer impossible with the exception of utilizing the Ctrl-Alt-Del func-
tion. Doing so will offer the user the option to close the active application or
reboot the computer. see Ctrl-Alt-Del, crash.
hard copy an actual printed paper copy of a computer document. A soft copy exists
only on a computer monitor.
hard disk a magnetic data storage platter made from aluminum and coated with
iron oxide used for saving computer data. The hard disk or hard drive usually
refers to the main or permanent storage device of a computer. In the early days
of personal computers, a typical hard disk stored 10 megabytes. It seems that
modern computers have an almost unlimited capacity for data storage with
hard disks now able to store up to 50 gigabytes of data and more in some cases.
hardware virtually any computer component or related device that isn’t regarded
as data or software. The display monitor, keyboard, connecting cables, optical
scanner, printer, modem, sound card, the actual box containing the computer
circuitry, and any other tangible computer component is considered hardware.
Hayes compatible an industry standard among modems and products using com-
mand language developed by Hayes Microcomputer Products Inc. known as AT
command set. Virtually all modems manufactured today are Hayes compatible.
head the component of a disk drive that reads and writes data to a magnetic disk or
tape. Double-sided disks drives have two heads.
head crash 60
head crash a serious disk drive failure where, in most cases, the head comes in
contact with the disk. In normal operation the head floats an almost immeasur-
able distance above the disk. If dust or dirt becomes lodged in this space it can
cause a loss of data and permanent damage to the disk. Disk replacement is the
only cure for such a disaster. Particles as small as cigarette smoke molecules
have been known to cause a head crash.
header 1. the first lines of a page in a word processing document. 2. the top
portion of an email message containing the address of the sender, recipient and
the subject of the message. 3. the top portion of a Web page containing the title.
heap a block of data storage space allocated to a programmer for writing a program
or a specific program function.
help in addition to the manual provided with most software, there also exists an on-
screen help button designed to assist the user with questions or problems en-
countered while operating the program. Activating the help button presents
the user with several help options such as an index of help topics, an explana-
tion of what the user can expect from the program, and a menu containing
detailed instructions for many of the program’s functions.
hidden files files not listed in the directory or easily accessible to users in operating
systems. Files vital to the operation of a system are hidden so a user will not
accidentally alter or delete them.
high density disk a floppy disk of high quality that is able to hold 1.44MB (mega-
bytes) of data and can only be used in high density diskette drives.
history a folder included as part of a Web browser that shows a user the Websites
that have been visited. For example, on Microsoft’s Internet Explorer, the his-
tory file may be accessed by first clicking View on the menu bar, then select
61 HotBot
Explore Bar, and finally, History. This will display the recently viewed Web
pages. The user can set the number of days a Website’s URL will stay in the
history file.
hit the request from a browser for a Web page and the delivery of that page by a
Web server. Strictly speaking, individual components of a page such as an iso-
lated graphic, and a block of text are each considered a hit. Therefore, a page
containing three pictures would be counted as at least three hits. Hits are used
to determine the volume of traffic a Website receives. see impressions.
Home key a special keyboard key that returns the cursor to the upper left portion of
the screen, but could have a different function depending on the program run-
ning.
home page 1. the primary page in a Website. The home page usually contains a
summary of the contents of the site along with the site’s features and provides
hyperlinks to them. 2. sometimes simply called Home, the Web page set in a
browser as the page that first appears when the user logs on to the Internet.
host any computer on a network that provides services to other computers with
access to the network. A Web host for example, provides the means for a server
to store and deliver it’s clients Web pages to users of the Internet. Host services
of many types are provided for a fee.
Hotmail a free browser-based email service hosted by Microsoft that allows a user
to send and receive email from any location in the world.
hourglass icon in Windows, the cursor changes to an hourglass while the program
is processing, indicating that the user must wait for the function to complete.
The hourglass is the equivalent of the watch icon in the Macintosh operating
system.
HTTP (Hypertext Transfer Protocol) the protocol that allows the transfer of many
documents on the World Wide Web. This is the familiar http:// seen at the
beginning of many URLs.
hub a center or origin point for devices containing many ports comprising a net-
work.
Human Click a free, realtime, interactive chat program available to Website man-
agers and webmasters allowing visitors to ask questions about products, ser-
vices etc. without having to first register. A visitor simply clicks an icon on
the site and an audio/visual alert lets the business know a user is making con-
tact.
hypermedia hyperlinks on a Website that connect a user to video, sound and en-
hanced graphics.
63 hypertext
hypertext any onscreen text containing links to other pages or files not necessarily
of the same or even similar formats. For example, a computerized tutorial for
learning how to use a typewriter might contain hypertext. After introducing a
particular concept, the tutorial might prompt the user to “see lesson 7 for more
information” and provide a link to that lesson. Web pages are classic examples
of documents that use hypertext. see hyperlink.
I
icon a small picture or image representing a program or file. An icon might also be
the logo for a software manufacturer or one of its products. Many computer
users set up their desktops with icons that represent shortcuts to opening
programs or functions. see graphical user interface, shortcut.
ICQ (I Seek You) a popular free Internet chat program that alerts members as to
the online presence of other ICQ subscribers and allows them to chat, send
messages, files, URL’s and play games. A user must download ICQ software
and register before using the program.
illegal operation in Windows, a message box that appears telling the user that the
program running has attempted to perform a function it is unable to execute for
any number of reasons. Usually it refers to a function related to an error in
programming.
iMac a colorful and stylish computer by Apple that offers users features such as
easy Internet access with a choice of browsers, the ability to play MP3 files,
QuickTime4 for digital video and streaming media, and in some models, a
DVD player. Apple’s comparable notebook computer is the iBook.
image map an image on a Web page that contains a number of hyperlinks. For
example, a Website devoted to the study of human anatomy might display a
picture of the human body. Directing the mouse cursor over the head and click-
ing could bring the user to a page that showed the brain, along with text de-
scribing the brain’s functions. Clicking on the heart might bring him to a page
describing heart functions, and so on.
image processing the manipulation and alteration of images using computer soft-
ware such as Adobe PhotoShop.
import the use of a file in a particular application that was created using a format
other than that of the destination application. For example, some programs
allow graphics to be imported using several different formats such as jpeg and
tiff.
impression the number of times an entire Web page is viewed. Impressions are
counted to determine the number of visits to the site. Some Webmasters are
interested in more information than simply the number of viewings. Because
they are measuring the effectiveness of certain types of advertising, the path a
user takes to arrive at a Web page is important, such as arriving as a result of
clicking a banner ad, or finding his way from a particular search engine.
index 1. a list, usually alphabetical, that refers to records in a database. 2. the list
of features offered on a Website.
information superhighway a popular term used to describe the Internet and virtu-
ally all associated computer networks. The term is almost self-explanatory in
that information is the main stock in trade of the Internet. The highway or
network over which the information travels makes it available to many people.
Some feel that the Internet needs closer monitoring by the government while
others believe that cyberspace is the last frontier of freedom. It should be inter-
Infoseek 66
esting to see how these differing opinions influence further development of the
medium in the years to come. Enforcing mandates related to the World Wide
Web will certainly present challenges because questions of legal jurisdiction,
penalties for violations, and enforcement in an ever-expanding global enter-
prise are almost certain to arise.
Infoseek a popular Internet search engine that utilizes keywords or phrases to seek
and locate information on the World Wide Web.
inkjet printer a printer that creates characters and images by spraying fine streams
of ink onto paper at high speeds. Inkjet printers are relatively inexpensive and
produce high quality text and graphics in both black and white and color.
input data entered into a computer from a keyboard, voice recognition software, a
mouse, another computer, or data storage device such as a disk or tape.
insertion point the place on a computer monitor where text or an image will next
appear, usually indicated by a flashing cursor.
integrated circuit also referred to as IC, another name for a chip. An electronic
device first developed in the 1950s, made from semiconductor material such as
silicon, containing tiny transistors, resistors, diodes, as well as a number of
ever improving and shrinking components. In computer lexicon, it is likely
one is speaking of the microprocessor or the brain of the computer when mak-
ing reference to the IC or main integrated circuit. see chip.
Intel a leading semiconductor chip maker, that supplies the computing and com-
munications industries with chips, boards, systems and software that are inte-
gral in computers, servers and networking and communications products.
67 Internet Society
interactive a computer that accepts input from a user via a mouse and/or keyboard
and returns results immediately. Most modern computers are interactive. A
non-interactive application would be one that, once started, would require no
human intervention.
Internet Explorer (IE, MIE) Microsoft’s popular Web browser, available for both
PC and Macintosh. In addition to offering an email program, Internet Explorer
allows users to view Web pages. see Explorer.
IRC (Internet Relay Chat) an online chat system that allows users to communicate
in realtime anywhere in the world. What makes ICR unique is it’s ability to
accommodate more than two users at one time.
ISDN (Integrated Services Digital Network) a standard used for the transmission
of digital data including voice and video signals over telephone wires without a
modem at a significantly faster speed.
ISP a company that provides customers with a connection to the Internet. see
Internet Service Provider.
jaggies the stair step-like distortion of text or an image, usually caused by enlarging
or inadequate resolution of a display monitor or printer. A variety of graphics
and paint programs may be used to “repair” jaggies.
Jaz drive an external disk drive manufactured and marketed by Iomega corpora-
tion. Presently, the capacity of a Jaz disk is up to 2 gigabytes. In the fast
moving field of computer technology, however, the capacity of a Jaz disk is
almost certain to increase in the not-so-distant future.
joystick a computer input device vaguely similar to a mouse, but with a far greater
level of functioning, designed primarily for playing games. A joystick is a lever
allowing a user the ability to point at images on a monitor, and in many appli-
cations, press a button on the top of the lever, firing a computer generated
missile of some kind, thus destroying an on-screen target. Outside of the realm
of gaming, the joystick can be a useful tool of function for people with disabili-
ties.
kbps (kilobytes per second) the standard measurement for the transfer of data via
a modem.
keyboard the input device resembling typewriter keys used to enter data into a
computer. The keyboard contains the individual letters of the alphabet, numer-
als and a host of special command or function keys. see Figure K.01. see Special
Key Functions, page 281.
keyword 1. a word that has a special meaning, or identifies a specific file or docu-
ment within a program. For example, in the Windows environment, if a user
forgot where a particular document was created, he could initiate a search for
the document by left clicking on Start then Find, then, Files or Folders. Typing
a “keyword” such as a single word from the document’s title will prompt a
search of all files. 2. When searching for a Web page or information from any
of the many search engines, the user will type in a word related to the page or
topic. In this case the keyword could be a single word or a phrase.
lag sometimes called hang time. A delay or waiting period encountered while a
computer processes data or a Web page loads onto a browser.
laptop a portable computer small enough to sit on the user’s lap. It has a pop-up
screen and is powered by batteries. Laptop computers are popular for travelers
as evidenced by the many fee-for-service docking stations appearing in air-
ports. These service centers provide plug-in power, printers, and dial-up con-
nections for getting online. see Figure L.02.
laser printer a printer known for its output of high quality documents. The device
uses a laser beam that produces an image on a drum while changing the drum’s
electrical charge. The drum rolls through a supply of toner and adheres to the
latency 74
latency similar to lag, latency refers to elapsed time while waiting for a computer
function. In network functions, latency is the time it takes for data to travel
from the source to the destination.
lasso a tool in many graphics programs that isolates an area allowing the user to
make changes. It is used by dragging the mouse cursor freehand around the
border of the designated area.
LCD (Liquid Crystal Display) a power and space-efficient type of display used on
many clocks, calculators, and laptop computers.
leased line a telephone line devoted entirely to a network or single computer con-
nection.
75 ListBot
LED (light emitting diode) a device that emits light (usually red) when an electri-
cal current is passed through it. LEDs last for a long time, however, require
more power than LCDs.
left click to press the left mouse button. This often initiates a command and can be
the equivalent of pressing the Enter key on the keyboard.
left justify to orient text so it conforms to a horizontal margin on the left side of a
document.
legacy applications and data, usually running on mainframe computers, that have
been in existence for a long time. Often it is difficult to phase out legacy system
data because subsequent applications have been written using the legacy mate-
rial.
license an agreement whereby a user, usually for a fee, is granted permission to use
copyrighted or proprietary materials such as software. Users of most retail soft-
ware applications agree to a limited-use licensing arrangement when installing
the program.
light pen a computer input device that acts somewhat like a mouse. A user points
a wand or pen at the monitor and the computer responds to commands sensed
from the emission of light from the device. Light pens are rare in modern
computing due to the popularity of the mouse. Light pens are sometimes used
in casinos to mark numbers in computerized Keno games.
line 1. a connection device such as a cable, used to link two or more hardware
components. 2. an isolated statement within a program. 3. a horizontal or
vertical arrangement of words, characters, or images in a document.
link 1. to attach. 2. on the World Wide Web, a link refers to a line of text or an
image on a Web page, that when clicked with a mouse, provides a connection to
another page within the site or a connection to an entirely different Website.
see hyperlink, hypertext.
ListBot a free Microsoft program conveniently placed on a Web page that allows a
Website manager to create a client database and communicate directly with
customers by sending them email messages with product announcements, news-
letters and special offers. ListBot can be used for the initial gathering of cus-
tomers and direct email marketing. For example, customers requesting an ezine
Live3D 76
from a Website will sign up with ListBot. The database is automatically main-
tained by the service, allowing the Webmaster to mail the publication to all
subscribers with ease.
Live3D a virtual reality program that expands the capabilities of Netscape Naviga-
tor 3.0 allowing users to experience enhanced sounds, sights, music, and ani-
mation.
load to transfer data from one source to another. On the World Wide Web, a Web
page is said to be loading during the time it takes to get from the server to your
browser. Often, large image files prolong loading time.
lock to guard a file, program, program component, or some other piece of data
from modification by users who have access to the data at the same time.
log out (log off) to end a computer or Internet session by closing the appropriate
files and programs.
look and feel the general impression a user comes to associate with using a par-
ticular software product. This is based on the program’s features, style, ease of
use, and a number of other considerations. We are beginning to see software
developers make claims to particular look and feel attributes as exclusive, and
therefore, subject to protection under certain laws such as copyright and trade-
mark statutes.
Look@Me a free interactive program that allows a user the ability to view another
user’s screen in realtime anywhere in the world.
lurk to watch what is taking place in an online public forum. see lurker.
lurker a slang term for an individual who watches the interaction of others in
public forums such as chat rooms, bulletin boards and message centers without
ever contributing himself.
Lycos 74
Lycos a popular full-text search engine on the World Wide Web that allows users to
customize a search.
Lynx a Web browser that supports text and not graphics. The benefit here is, be-
cause Lynx does not have to load graphics it is much faster than the more
popular graphical-access browsers.
M
macro a key, name, or symbol that represents and initiates a command sequence.
For example, for the sake of streamlining repetitive functions, some programs
allow you to set your computer to enter your name, address, or any other fre-
quently used phrase or character string, by pressing a particular series of keys.
The selected item is then inserted to the chosen location.
macro virus a computer virus that is found programmed as a macro, and embedded
into a file document. The virus is designed to execute when the document is
opened. Today, most viruses are macro viruses. A user can protect his com-
puter by installing and periodically updating antivirus software.
mail bomb an email containing a large file or files designed to jam an ISPs server
and/or the recipient’s mail program. Once a bomb is opened, depending on the
size of the file it contains, it can take hours to load. With many ISPs, a user’s
penalty for mail bombing is discontinuation of service.
mailbox a directory maintained in an ISP’s server that stores email until a user
downloads it. Email may be saved in both the ISPs server or in the users com-
puter.
maillist in most modern email programs, the addresses of the people a user sends
messages to are stored and called a maillist making it an electronic address
mail filter 80
book. With this feature a user can also send the same message to everyone on
the list with a simple mouse click.
mail filter a program allowing the user to sort email according to its subject or
heading.
Majordomo a free UNIX mailing list program that allows a user to deliver mass
email (called opt-in mail) to users who have requested particular information.
marquee usually a line of scrolling text created with Dynamic HTML and Java
applets displayed on a Web page. Some Web browsers will not support scroll-
ing text.
mask in graphics, drawing, and paint programs the term takes on different mean-
ings. In a draw program it means to partially obscure the view of an image by
hiding it behind a hole or opening. In a paint program it is the isolation of an
area so it cannot accept other images.
MBps when written with an uppercase B, short for megabytes per second.
mbps when written with a lowercase b, short for megabits per second.
81 MediaCast
maximize
minimize & restore close
MBONE a virtual network that is layered on top of portions of the physical Internet
to support routing of IP multicast packets because that function has not yet
been integrated into many production routers. The network is composed of
islands that can directly support IP multicast, such as multicast LANs like
Ethernet, linked by virtual point-to-point links called “tunnels.” The tunnel
endpoints are typically workstation-class machines having operating system
support for IP multicast and running the “mrouted” multicast routing daemon.
media 1. elements of data storage such as magnetic tape, floppy, zip and jaz disks,
and CD-ROMs. 2. a manner of making computer information available to the
user such as, sound and video. 3. a method of mass communication such as
radio, television and the World Wide Web.
memory data storage space inside a computer. Memory usually refers to data stored
using a chip or chips, while the term storage refers to data maintained on disks
or tape. All computers are equipped with what is known as physical memory,
called the main memory or Random Access Memory (RAM). RAM is the same
as physical memory. In the recent past, the standard memory capacity for an
off-the-shelf Personal Computer was anywhere from 16 to 32 megabytes of
RAM. Today, many stock computers come equipped with 64 to 128 megabytes
of RAM and often more.
memory leak a glitch that causes a program to use more and more memory until it
finally causes a crash of the system.
menu bar similar to a toolbar except the options or commands appear as a hori-
zontal line of words including File, Edit, View, etc. at the top of a computer
screen rather than icons or symbols.
merge to combine information from one file with information of another file in a
manner that maintains the inherent order (often alphabetical or numerical) of
each.
message box the same as an alert box, a small dialog box appearing on a computer
screen that notifies the user of a changing condition with the application. For
83 microcomputer
example, a message box might appear telling the user that the program is
running low on memory and suggest closing down other applications to free up
resources. The message box will disappear only after the user acknowledges
the message by clicking on one of the options offered.
meta a prefix used in computer science meaning “relating to” or “based on.” For
example, a metadirectory would be a directory relating to, or about directories.
More simply put, a directory of directories.
MIPS (Million Instructions Per Second) a somewhat dated way of measuring the
speed of a computer determined by how many instructions the machine can
process per second.
85 modem
mirror technically speaking, an exact copy of something. However, there are two
relevant definitions important with regard to computers. 1. to invert an image
so its “mirror” reflection is present along with the original. 2. the duplication
of Web pages on more than one Web server. This is done to relieve the high
demand on the server of a popular Website.
maximize
minimize & restore close
mode the operational state of a piece of computer hardware or software. For ex-
ample, if a Windows user thought she was about to experience a hard disk
malfunction, (in many cases the computer would actually tell the user that hard
disk failure was eminent) she would open Windows in the safety mode and be
sure to backup all important files before having a technician examine the ma-
chine.
modem a device that allows for communications between computers via a tele-
phone line, coaxial cable, or fiber optics by transferring digital data. The trans-
fer rate of the information is measured in bits per second (bps). Modems may
be connected to computers internally, or externally. Wireless modems are avail-
able for portable computers and work much like cellular telephones.
moderated mailing list 86
moderated mailing list a collection of email recipients who receive messages be-
fore they are sent to subscribers.
monitor (display monitor) a television like device that converts computer informa-
tion into graphical images and text.
morph short for metamorphosis, meaning the gradual, yet complete changing of
an image to one that is totally different.
Mosaic a multimedia Web browser distributed freely (there are versions available
for sale as well) by the National Center for Supercomputing Applications
(NCSA) used for the viewing of HTML and other documents on the World
Wide Web. Mosaic was widely responsible for the initial popularity of the Internet
in the early 1990s.
motherboard the main circuit board of a computer which provides connections for
all other peripherals such as the BIOS, serial ports and expansion slots. The
motherboard houses the microprocessor and memory.
mouse a popular computer input device, vaguely shaped like a real mouse, that
allows the user to select commands displayed on a monitor and easily initiate
those commands by clicking the device. A mouse is used by moving it around
a small field on a physical desktop (often a mousepad). Moving the mouse
positions a pointer, or mouse cursor on the monitor. When the cursor is in
position, (placed over a command button, or hyperlink) the mouse is clicked to
initiate the command. The mouse was developed by Douglas Engelbart and
Xerox Corporation in the 1970s, adopted by Apple soon after, and utilized with
huge success by Microsoft with the introduction of Windows in the early 1990s.
The mouse is a vital component of the graphical user interface. The plural of
mouse is mice and they are available in cordless models.
mouse potato a slang term adapted from couch potato to describe an enthusiastic,
perhaps obsessed, computer user.
Mozilla the original name for the Web browser, Netscape Navigator.
MP3 (MPEG Third Layer) a standard for the compression of audio files allowing
for high compression ratios without a loss in sound quality. The compression
of the audio signal can be likened to an encrypting of sorts. A special
player is required to listen to MP3.
MPEG (Motion Picture Experts Group) a standard for playing digital video and
sound on a computer. MPEG is a file format using high compression. MPEG
files are found on DVDs, CD-ROMs and Websites.
MS-DOS (Microsoft Disk Operating System) the operating system first developed
for the IBM Personal Computer and compatibles in 1981 by Microsoft. Win-
dows 95, 98 and 2000 each include a version of DOS.
MSNBC a co-venture of Microsoft and NBC focusing on the Internet, cable, and
broadcast media.
MUD 84
MUD (Multi User Domain or Multi User Dimension or Multi User Dungeon) a
realtime, interactive virtual community where the inhabitants assume identi-
ties using avatars. Initially, MUDs were almost exclusively devoted to role play-
ing activities, today, however, the term is also synonymous with chat rooms.
multitasking the ability for a computer to run more than one application or task at
one time. Technically speaking, a computer’s microprocessor executes only
one task at a time. However, the CPU quickly alternates operational functions
among open programs to give the appearance of simultaneous operation. For
example, a user might finish work on a document and print it. While it is
printing, she can begin work on another document using a word processing
program, play a game, or navigate the World Wide Web.
nagware software distributed on the Internet that the user agrees to pay a small fee
to use. The name nagware comes from the periodic appearance (usually before
or after each session) of a pop-up message reminding the user he has not yet
registered. see shareware.
name server also referred to as a domain name server, a computer that translates
domain names into IP addresses.
nav bar (navigation bar) various on-screen controls found on a Web page allowing
the user to scroll from left to right, or up and down. Utilizing these helpful
tools offer a user a wide range of menus, instructions, FAQs, and allow for
easier access to the World Wide Web. Nav bars might also be hyperlinks point-
ing to other pages or Websites.
near letter quality (NLQ) a printing standard where the documents produced
resemble the higher standard, “letter quality” produced on a quality typewriter.
Laser printers produce letter quality documents. Although some inkjet printers
advertise “near letter quality” performance, it is difficult for the untrained eye
to distinguish NLQ from letter quality documents.
Net when written with upper case N, short for Internet. When written with lower
case n, .net is the suffix for a domain name or an email address such as
cutiepie@cybertown.net.
net guru sometimes referred to as net god, or net personality, an individual who
has been on the Internet for a long time, is recognized in many public and
private chat or message forums, and who’s opinion is highly regarded.
Net Nanny software designed to keep children from accessing undesirable Websites
such as pornography or violence-oriented destinations.
Net PC a computer designed by Intel and Microsoft with the intention of providing
users with a low cost machine whose sole purpose is navigating the World
Wide Web. As the cost of PCs continues to decline, the idea seems to have lost
momentum.
net police sometimes called a den mother, an individual who takes it upon himself
to enforce the unwritten rules of a chat or message forum, often using his own
standards, while continuously reminding others of those standards.
netiquette the combination of the words net and etiquette, the term refers to the
unofficial standards of good behavior on the Internet. Acceptable online be-
havior was established, for the most part, in newsgroups and online communi-
cation forums, and has become the adopted protocol. For example, it is bad
netiquette to post a message using all uppercase letters (caps) because that is
91 newsfeed
considered shouting and it’s hard to read. Other violations of netiquette in-
clude, blatant posting of commercial messages, using foul and abusive lan-
guage, and posting messages that are not related to the topic of the forum.
Enforcement and consequences for violators of netiquette is handled by other
users and might include some form of admonishment such as flaming or sim-
ply ignoring the culprit.
Netscape Navigator a popular Web browser formerly called Mozilla and devel-
oped by Netscape Communications Corporation. It is widely felt that the intro-
duction of Netscape Navigator helped to bring the Internet to the masses.
network two or more computers linked together for the purpose of communicating
with each other.
Network Solutions the world’s leading Registrar of Web domain names, helping
businesses and individuals to establish an online identity, communicate with
their customers and conduct commerce, all online.
neural network computer programs loosely modeled after the functioning of the
human nervous system. A type of artificial intelligence pioneered by Bernard
Widrow of Stanford University that recognizes and records sequences and pat-
terns and makes subsequent evaluations based on previous conclusions. Such
conclusions are approximations, and not definitive.
newbie a newcomer or novice in almost any field, in this context, to computers and
the Internet.
newsfeed similar to a syndicate. The network sources from which Internet Service
Providers (ISPs) receive news groups and make them available over the Internet.
newsgroup 92
newsgroup an online discussion forum existing on any network, however, the term
most often refers to forums that use the Internet. There are literally thousands
of topics for newsgroups. Before joining in a discussion, it is usually wise to
read a number of postings and get a feel for the topic and flow. Many newsgroups
consider their topics and forums seriously and tolerate little or no nonsense.
newsreader a software program (there are many freely available for downloading)
that facilitates the reading and posting of messages on a newsgroup. Microsoft
Internet Explorer and Netscape Navigator both include newsreaders.
NiCad battery (Nickel Cadmium) a common type of battery used in laptop com-
puters.
NNTP (Network News Transfer Protocol) the protocol used by both Web browsers
and servers to send and receive USENET postings and news articles.
noise any type of interference such as static that hinders communications. Tele-
phone, cable, and radio transmissions are all subject to noise.
Norton Anti-Virus popular software designed to keep computers safe from viruses
that might come in from e-mail attachments, Internet downloads, floppy dis-
kettes, software CDs, or a network. It can be scheduled to automatically re-
trieve new anti-viral definitions as often as once a week.
Not Found 404 an error message sometimes encountered while navigating the
Internet that reads as follows: The Web server cannot find the file or script you
asked for. Please check the URL to ensure that the path is correct. There are
various reasons for getting this message. Several possibilities include: one of
several servers needed to deliver the page to a user might not be functional at
the time the page was requested; the Website may no longer be operational; a
hyperlink may be broken; the page might be hosted by a new carrier, or the
URL was typed incorrectly.
Novell Inc. a leading provider of Net services software that delivers services to
secure and power all types of networks; the Internet, intranets, and extranets;
wired to wireless; corporate and public, and across leading operating systems.
93 Num Lock
numeric keypad a set of keys isolated from the main character keys on a computer
keyboard. These include the numbers 0 through 9 as well as the Home key,
Num Lock key, Pg. UP and Down Keys, Arrows up, down, left and right keys,
a Del key, Ins key, and End key. The functions of the keys on the numeric key-
pad depend on whether the pad is in numeric mode or cursor control mode.
Numeric mode is activated by pressing the Num Lock key. Numeric mode al-
lows the user to work with numbers, while cursor mode allows for the use of
the arrow keys to move the cursor around the screen.
Num Lock a key found on the numeric keypad of a computer keyboard that
switches functions between numeric mode and cursor mode. see numeric key-
pad.
O
off-line reader software that allows a user to log onto the Internet, download Web
pages and email, and view them offline at the user’s leisure.
91 operating system
Office short for Microsoft Office, a grouping of software (bundle) products that
includes word processing, publishing, spreadsheets, visual presentation and
Web page creation programs. Users are offered a significant price reduction
when purchasing the software in this package.
OLE (Object Linking and Embedding) software that allows a user to create a file
in one application and incorporate it into another, while retaining the original
file format and association to the program that created it. Windows and
Macintosh operating systems allow for OLE.
on the fly a Web page with dynamic content, or one where the content is frequently
changed. On the fly is the opposite of a static or hardwired page whose content
seldom changes.
online service the term has come to have a somewhat broad meaning. 1. a com-
pany that, for a fee, provides Internet users with a wide variety of services such
as news, weather, stock quotes, search engines, chat and message forums, email
services, as well as various subscriber benefits possibly including special rates
on mortgages or credit cards, and various other commercial offers. America
Online (AOL) and CompuServe are online service providers. 2. a company
that provides one of several services to Internet subscribers such as Web host-
ing or providing the connection for users to access the Internet. For example,
an Internet Service Provider (ISP) would supply its customers with access to
the Internet, email, and in some cases, the space to publish a Web page or two.
Often, but not always, a company outlined in the first definition will provide
many of the services mentioned in the second.
operating environment the configuration and type of equipment under which com-
puter programs run. see environment.
operating system (OS) the underlying software that interfaces with a computer’s
hardware and virtually all other software applications allowing a user to per-
form a wide variety of tasks. In the early years of personal computers DOS was
the dominant operating system. Then Microsoft Windows came along. In gen-
eral terms, Windows was the logical user-friendly evolution of DOS, utilizing the
graphical user interface concept modeled after the Apple Macintosh. Simply
stated, any operating system provides an environment for a user to run other
programs.
optical button 96
optical disk a data storage medium that utilizes laser technology to read informa-
tion. CD-ROMs and WORM (Write Once Read Many) are examples of optical
disks.
optical scanner often simply called a scanner, a device that reads images and text,
allowing a user to input and utilize the data in various applications. A scanner
digitizes the image. This means it divides the entire image into tiny boxes and
assigns a value to each isolated unit using 0s and 1s. Essentially, this is what a
bitmap is. The scanned image, whether text or a graphic, therefore, becomes a
bitmap. Consequently, the scanned data cannot be directly altered unless opti-
cal character recognition technology is used. see OCR.
optimize the term has several common uses. 1. to structure and arrange hardware
devices for maximum efficiency. 2. to tune up a computer system, as in running
defragmentation software and eliminating unwanted data to free up disk space.
3. to make adjustments to an operating system or software application so it runs
more efficiently.
opt-in mail email that usually contains a commercial offer of some kind. The
difference between opt-in mail and spam, is with opt-in mail, the user has
requested information or updates on a particular type of product or service.
Once an individual has submitted his name and email address for virtually any
online offer, the data is freely traded among both brick and mortar businesses
and online merchants, unless such use of the name was forbidden when the
subscriber submitted the information.
option key a key on the Macintosh keyboard that changes the functions of other
keys. The Mac’s option key is similar to the Shift or Alt key.
orphan in word processing and publishing, the last line of a paragraph appearing
on the first line of a page. Some applications adjust for this. Orphan is synony-
mous with widow.
OS2 a Microsoft operating system developed in the 1980s that is compatible with
DOS and Windows programs. OS2 applications however, will not run on Win-
dows or DOS. Originally, the development of OS2 was a joint venture between
IBM and Microsoft. It is now a sole product of IBM.
output data resulting from the operation of a computer. Output may be displayed
on a monitor, printed, stored on a disk, or played on loudspeakers.
output device any computer hardware that facilitates the interpretation of com-
puter data. Display monitors, speakers and printers are output devices.
overwrite to enter new data onto a disk, replacing the information previously
stored there.
P
packet switching the method used to send information over a network. Each packet
has the address of the sender as well as the destination address. This allows
information to intermingle with other packets of data, without being lost or
misdirected, while making it’s journey over the network.
Page Down key a key on the numeric keypad that, when set in the cursor mode,
moves the cursor down by a pre-specified number of spaces on the display
monitor.
page impressions (compare to hit) also referred to as page views, the number of
times a particular Web page is visited by a user. This is a more accurate method
of tracking site activity than counting hits because page impressions account
for a server delivering an entire page to a viewer. A hit refers to individual
95 parameter
Page Up key A key on the numeric keypad that, when set in cursor mode, moves
the cursor up by a pre-specified number of spaces on the display monitor.
paint program an application that allows a user to draw pictures and create images
using straight lines, boxes, ovals, as well as apply color and shading. The pro-
gram also includes tools for manipulating images such as a pen or brush for
drawing, scissors for cropping, a spray can used for painting, and an eraser. An
image created by a paint program is formatted as a bitmap. Many operating
systems include simple paint programs, however, such applications are avail-
able commercially and offer a wide range of creative options for artists and
graphic designers.
palette one of a set of tools included in graphics and paint applications. The palette
is a selection of colors, usually displayed in small boxes. The user can select the
desired color, and click OK to apply it.
palmtop a computer small enough to fit in the user’s hand. Primarily used as
personal organizers, they provide users with the ability to store names and
addresses, play games, access the Internet, and use a calculator. 3Com’s Palm
Pilot is a popular palmtop. see hand-held computer.
parallel port a computer connection that allows data to flow using more than one
wire. Most printers are connected to a computer using a parallel port allowing
faster transmission than a serial port connection. see serial port.
parallel processing the simultaneous use of more than one microprocessor to run
a program, allowing for faster execution.
park to safely secure the read/write head of a hard disk so that it isn’t damaged
when a computer is moved. Modern hard disks automatically do this when the
computer’s power is shut off.
partition to alienate sections of a hard drive for individual uses. Each section acts
as a separate disk and improves the overall storage efficiency of the disk. Soft-
ware applications are available allowing a user to partition a hard disk.
passive matrix a low resolution liquid crystal flat-panel display used for computer
monitors. Although the display quality is not quite up to par with the active-
matrix display screens, the significant difference in the cost of the passive ma-
trix has caused it to remain popular.
paste an efficient way to insert a single letter, word, an entire block of text, or an
image from one location within a document or file, to the same or another
document or file. To paste, means to place the material, into a document. It’s
easy to do. For example, in Windows, say you decide you want to move the first
paragraph of a document to the middle of the page. Place the mouse cursor just
to the left of the first word in the paragraph. Now, left click the mouse and keep
the button down while dragging the mouse over the entire paragraph, until all
of the text is highlighted. Release the button. Now, in the menu bar, click
Edit, select Copy, and click. The block of text is now temporarily saved on the
Windows clipboard. Next, place your mouse cursor at the point in the docu-
ment where you want the paragraph to appear and click. The screen cursor
should be blinking. With your mouse, go back to the Edit command and click
on Paste. If you’ve done everything correctly, the paragraph will appear at the
point of the blinking cursor, making room for itself by pushing any other text
forward. You can also copy and paste in exactly the same way from one appli-
cation to another. see copy and paste.
path in DOS and Windows, the series of directories where an operating system
searches for executable files called up by a user.
PC (Personal Computer) originally the IBM personal computer, but today the term
refers to any IBM clone or compatible computer, or any personal computer that
isn’t a Macintosh. Additionally, PCs are considered to have Intel or Intel-compat-
ible microprocessors.
Desktop Tower
PDA (Personal Digital Assistant) a generic term for any number of electronic
computing or communications devices that are able to act as cellular phones,
fax senders or personal organizers. Although somewhat expensive, PDAs are
becoming more sophisticated and easier to use.
pen computer a computer (usually hand held) that uses an electronic stylus for
input.
Perl a popular programming language developed by Larry Wall primarily for pro-
cessing CGI scripts.
photo scanner an optical scanner that specializes in scanning photos. Photo scan-
ners usually offer better resolution than conventional scanners.
PhotoShop a popular image editing program produced by Adobe that allows a user
to create original artwork, retouch or dramatically modify photographs, and
create special effects for a wide variety of projects such as magazines, books,
posters, or Web pages. Many artists feel PhotoShop is the standard by which
other image editing software is judged.
phreaking similar to hacking, only the phreaker’s goal is to access a phone system
for the purpose of making free long distance calls. see cracker, hack, hacker.
PIF (Program Information File) in DOS and Windows, a file that contains instruc-
tions on how to run a program other than DOS or Windows.
pin 1. a small wire shaft in a dot-matrix printer that strikes an inked ribbon pro-
ducing the dots that make up characters and images. The resolution of a dot-
matrix printer depends on the number of pins present on the printer head - the
more pins, the better the resolution. 2. an individual wire component found in
a cable connector such as a 29 pin connector. see Figure P.02.
pipe a connection between two software programs that acts as a shortcut in access-
ing data.
piracy the unauthorized duplication and/or use and distribution of a software pro-
gram. Buying a program usually allows the user a limited license for its use on
a single computer. In the past, software manufacturers tried to discourage pi-
racy by copy-protecting their products. However, because US copyright laws
allow a legitimate holder of a program to make a backup disk, measures such as
owner registration have been used to discourage unauthorized use. Aside from
being illegal, there are several other reasons for not using pirated software.
Among them, the user gets no operating manual, no technical support, and
runs the risk of introducing viruses into a computer by installing a bootlegged
program.
pitch 1. the number of characters of a particular font that will fit into a measured
space. 2. the amount of space dividing pixels on a display monitor.
pixel one of many tiny points that make up an image or character on a display
screen or printed page. A pixel is the smallest component of an image on a screen
or in printed material. For example, the quality of a display screen image depends
on how many pixels the monitor can accommodate. There are a wide variety of
monitors available with varying resolution qualities ranging from 300,000 to more
than 16 million pixels per screen.
105 PointCast
PKZIP a popular free file compression program developed in the 1980s by Phillip
Katz. Once a file is compressed it is said to be zipped. When decompressed,
unzipped.
plasma display a flat display monitor that uses ionized gas compressed between
panels to produce images.
plotter a computer output device that draws images on paper using a pen. A plotter
draws real lines rather than simulating them as a conventional printer would
by producing a series of very close dots.
Plug and Play a computer hardware device such as a monitor or printer that is
ready to use with other hardware without requiring special configuration. In
simple terms, plug-and-play hardware introduces itself to the computer, and
automatically sets itself up for functioning.
PNG (Portable Network Graphics) a graphics file format similar to GIF that en-
codes images as bitmaps.
PointCast a free online subscriber-based news and information service that utilizes
a wide variety of sources from CNN and Reuters, to Newsweek and the New
York Times and many more. A subscriber may customize news and informa-
tion to her needs.
pointer 106
point-of-sale system a computer system that acts as a cash register as well as one
that keeps track of invoicing, inventory, and sales in a retail environment.
POP 1. (Post Office Protocol) the standardized protocol an ISP uses that tells its
server software how to accept email. 2. (Point of Presence) a physical location
where an ISP or Internet hosting service maintains a telephone or cable con-
nection, modems, computers, and other equipment necessary for its business.
3. (Point of Purchase) see point-of-sale system.
portal an entry point to the World Wide Web usually providing services such as
email, search engines, news, weather, stock quotes, chat and message forums,
and a number of additional benefits designed to attract users to the site.
Such Websites encourage users to set the site as their Homepage. Many of the
top search engines, in an effort it increase site traffic, have endeavored to be-
come all-purpose cyber-utilities, providing a user with many of the services the
World Wide Web has to offer. Yahoo and MSN are common portals.
portrait a document with vertical orientation. In other words, the page is taller
than it is wide. Portrait orientation is opposite of Landscape.
107 PPP
post as a verb, to write and upload (send) a message to any number of public or
private online forums such as a chat room or bulletin board. As a noun, the
actual message that ends up on display in the forum.
power supply an internal computer component that supplies and regulates the
power a computer receives. The power supply is designed to keep a steady
stream of power flowing to the computer as well as preventing unexpected
power spikes or surges.
ppm (pages per minute) the number of pages per minute a printer can produce.
The standard applies to text only as printing graphics slows a printer signifi-
cantly.
preview in word processing applications, a feature that allows a user the ability to
look at a document on the screen and have it appear exactly as it would when
printed. This is a useful tool because many programs permit the user to view
only a portion of a document while actually working on it.
printer a hardware output device used to produce a hard copy of a text or image
oriented document. Printers are available in color or black and white. Printer
resolution has improved greatly over the years as costs have continued to fall.
Among the printer types available are the daisy wheel, where the actual print-
ing mechanism is similar to the IBM Selectric typewriter with its ball and
wheel paper striking device; the dot matrix; the ink jet; the laser printer, de-
signed for high resolution, the high-speed line printer that produces low
quality output; the LCD and LED, both high resolution devices and the ther-
mal printer such as might be found with older copy or fax machines. Some
printers, such as the line and daisy wheel, are capable of producing text-only
documents. Hewlett Packard, Cannon, and Epson are among the many compa-
nies manufacturing low-cost, high-speed quality printers capable of many func-
tions.
109 program
printer driver the software program that tells a printer what to do. Modern oper-
ating systems include printer drivers that the user must select when installing a
printer. However, printers come equipped with their own drivers that also must
be installed when setting up the device. Installing a driver is simple, as the user
simply needs to insert the program disk and follow a few simple prompts dis-
played on the screen at the time of installation. The printer is then configured
to work with that particular computer. It is best to use the driver that comes
with a printer when it is available.
printer engine the fundamental component of the printer that does the actual
printing. The engine determines the resolution quality of the printed product
as well as the speed of the printer.
Print Screen key a command key on most computer keyboards that, depending on
the application running, sends the image displayed on the monitor to the clip-
board.
Prodigy a popular online Internet service provider offering users Internet access,
news, travel, email, business, sports, online chat and many other services.
proxy server existing between a client Web browser and a real server, a computer
that caches common and often requested Web pages and holds them for easier
access by users. Proxy servers allow for faster access to Web pages for groups of
users in a particular area. For example, quick access to popular online services
such as America Online is provided by AOL’s many proxy servers, which are
positioned regionally.
public domain software, clipart, photographs, music and other intellectual prop-
erty that is available for use by the general public for free. Public domain items
may be un-copyrighted or intellectual property where the copyright has run out
and now available for anyone to use.
pull to call for information from a Web server. The majority of Internet activity is
currently based on pull technology. That is, a user requests information from a
server. The opposing concept, called push, is oriented toward a user having
information broadcast or transmitted to them as a subscriber.
pull-down menu a list of options or selections a user calls for by selecting a choice
offered from a menu bar or other on-screen prompt.
push receiving information over a network without necessarily having asked for it.
Most Internet users actively call for Web pages from servers. In doing this they
are utilizing pull technology. The opposite is push technology whereby a user
receives information randomly. An example of push technology is email.
pyramid scheme (Ponzi scheme) a method of making money that requires new partici-
pants to invest in order for previous investors to be paid. The problem with this
plan is that it continuously requires new investors. The Ponzi scheme can be
thought of as an expensive game of Old Maid. Unfortunately, pyramid schemes
eventually collapse because it becomes increasingly difficult to attract new play-
ers. Chain letters, asking people to send money to others listed in the letter, and
then crossing off the last recipient’s name and replacing it with yours, are a form
of pyramid scheme. The pyramid scheme is mentioned in this book because the
Internet is alive with such offers. As with anything else, a user would be wise to
know the company or individual he is dealing with before sending money.
Q
QIC (Quarter-inch Cartridge) a popular type of backup data storage that uses
magnetic tape.
queue pronounced “Q” a waiting line where elements of many varieties are sorted
and are waiting to be processed. For example, a number of printing jobs may be
“queued up” waiting to be printed. The printer takes a single document at a
time and prints it.
QuickDraw Macintosh graphic control language used to create, display and ma-
nipulate graphical images.
QuickTime part of the Macintosh operating system used for the display of video
and animation that requires a special QuickTime driver. QuickTime is avail-
able for PC users by downloading the Windows plug-in.
radio buttons one of a group of items or options appearing in a dialog box or drop-
down menu, that once selected, inactivates the others, unlike items available in
a check box, of which more than one may be chosen.
ragged margin in a text document, a margin that does not line up vertically. The
margins in this book are left justified with regard to the terms and definitions
and ragged on the right. An example of a right ragged margin:
Four score and
seven years ago, our
fathers brought forth on this
RAM 114
RAM (Random Access Memory) pronounced ramm, computer hardware that stores
and accesses data as needed from any location within the memory on a short
term basis. RAM holds needed information from the application currently run-
ning, allowing for quick access as it is called up. The data stored in RAM is
cleared when the computer is shut down. There are two types of RAM. Dy-
namic RAM and Static RAM. (DRAM and SRAM) To facilitate its own func-
tioning, DRAM requires an electrical charge, which is refreshed thousands of
times each second while in use. While SRAM is faster because it doesn’t need
to be refreshed, it is considerably more expensive than DRAM. Because of its
higher speed, SRAM is often used for caching. RAM refers to a computer’s
main memory as opposed to read-only memory (ROM), which contains neces-
sary pre-recorded data used for booting the computer and other routine func-
tions. see DRAM, SDRAM SRAM, ROM.
RAM disk a portion of RAM (random access memory) used to simulate a disk
drive. Utilizing RAM in this way allows for quicker access to information than
calling it from the hard disk, but has some limitations. First, files must be
copied from the hard disk to the RAM disk for each session and the new mate-
rial must be copied back to the hard disk before ending the session. This is
necessary because, like normal RAM, a RAM disk clears all data when the
computer is shut down. Additionally, a power failure will cause the loss of data
on a RAM disk.
raster the rectangular portion of a display monitor where the actual image appears.
The raster is usually smaller than the true dimensions of the display panel. On
most modern monitors the raster can be adjusted to allow for maximum image
display.
raster graphics a bitmap image pattern usually in a GIF or JPEG format that fills
an entire display monitor assigning color values to every available pixel.
raster image processor (RIP) components made up of hardware and software that
combine to convert a vector image into a bitmapped image. Inkjet and laser
printers are raster image processors.
115 real time
rasterize to transform a graphical image into a bitmap so that it fits the shape and
size of a raster output device such as a printer.
raw data computer input that has not been organized, categorized or formatted.
read to access stored data, usually by transferring it from one of many storage
media such as magnetic tape or floppy disk, to a hard disk for display or pro-
cessing.
readme file information contained in a software program that was not part of the
users manual, usually an update, improvement, a recent development, or fea-
ture.
read-only recorded computer data that is recorded and cannot be changed. Operat-
ing systems contain many read-only files.
read/write data recording and storage media such as a floppy disk or CD-RW, that
allows a user to access information (read) and record/store information (write).
real estate a slang expression that refers to the physical space on a desktop, or
computer desktop space. In programming, the hard disk or chip memory space
available for data input.
real time also realtime, 1. live online communications. The term refers to several
types of information transmissions. For example, real time chat programs provide
real time chat 116
users with a medium to communicate live by typing messages back and forth.
Real time stock quotes give users individual live stock quotes as they change
throughout the trading day. Stock quotes can be “snapshot” or “streaming.”
Streaming real time quotes change on the user’s monitor as they change on the
exchange trading floor. Snapshot quotes are real at the time they are downloaded,
but must be refreshed manually for subsequent updates. 2. immediate response
to an input command by a computer. Most operating systems can take several
seconds to minutes to respond to commands, thus do not respond in real time.
real time chat a program that provides a live online forum for users to communi-
cate by typing messages to each other. ICQ and Microsoft Messenger Service
are real time chat programs.
real time clock a battery operated clock inside a computer that runs even when the
computer is turned off.
reboot to restart a computer for any number of reasons. Some computers have
a reset switch, others will reboot using a series of key commands such as, Con-
trol, Alt, Delete and choosing to restart the computer when prompted.
rebuild Desktop a housecleaning operation for the Macintosh that clears the
computer’s memory of obsolete data, thus improving performance. To rebuild
the Desktop, a user holds down the Command and Option Keys while booting.
The computer will ask the user if she wants to proceed, if so instructed, the
computer will then clear the unnecessary data.
reciprocal link a hyperlink placed on a Web page in exchange for a link on another
page. In an effort to increase site traffic, Web managers with similar, but usu-
ally not competitive goals, do each other the favor of providing reciprocal links.
record a set of data components comprised of fields, that make up a file. For
example, a word processing document might contain text and graphs. The text
would be included in one field, and the graphs in another.
Recycle Bin comparable to the Trash Can in the Macintosh. In the Windows envi-
ronment, a folder represented on the desktop by an icon of a small recycle bin.
117 remote login
This is where deleted files are temporarily stored until they are either cleared
permanently from a computer’s hard disk or restored.
Red Book a standard established by Phillips and Sony for CDs that, among other
things, set the playing time of a recorded CD at 74 minutes, transferred at a
rate of 150 Kbps.
redlining in printed word processing documents, the marking of edited text, not-
ing sections that need to be changed or corrected.
refresh 1. to update a Web page. Websites offering dynamic content, that is, ever-
changing information such as breaking news, stock market or weather reports
etc., require a user to update pages containing the changes. Web browsers allow
for this with a refresh option. On Microsoft Internet Explorer, there is a button
labeled Refresh located in the toolbar. In Netscape Navigator, it is called Re-
load. 2. to recharge, as with a display monitor or memory chip. To function
properly, most memory devices are constantly being charged with power or
information.
register a high speed storage space within a CPU. The size and number of registers
in the central processing unit are critical in determining the speed and power of
a computer.
remote hardware, software, and data not directly included in, or connected to a
workstation.
remote terminal the term is synonymous with remote access and remote login. It
means to have the ability to log onto a network, (thus utilizing all of its re-
sources), from somewhere other than the actual terminal site. One small draw-
back to remote access is a slight compromise in network navigation speed.
removable hard disk a hard disk that can be treated as a floppy disk in that it is
easily removed and used as needed, yet with all of the speed and storage capa-
bilities of many internal hard disks.
render the use of special software to enhance a computer image by adding dimen-
sion, color, and shading.
reset button a switch or button on a computer that stops all functions and restarts
the computer. Using the reset button to restart a computer is often the method
of last resort after the computer has crashed and all other reboot measures have
been exhausted.
restore to bring a window back it its original size after having been minimized or
maximized. see maximize, minimize.
Return key in word processing, pressing the Return key moves the cursor (inser-
tion point) to the next line. In many applications, pressing the Return key con-
119 right click
firms the choice of an option or initiates a prompt. In this case, the Return key
and the Enter key act in the same way. see Enter key.
maximize
minimize & restore close
reverse to exchange black characters for white or white characters with black,
often to add effect. Careful choice of fonts is necessary in using this technique
as the finer details of many fonts do not always contrast well in reverse.
RFC (Request for Comments) maintained by the Internet Task Force, a collection
of notes and observations made about the Internet, beginning in the late 1960s
when it was called the ARPANET. With the evolution of the medium, individu-
als have had the opportunity to make unofficial suggestions about various pro-
cedures and protocols as “Request for Comments.” Many have evolved into
Internet standards. For example, RFC 2660 addresses the issue of Secure
Hypertext Transfer Protocol.
RGB red, green and blue, the colors that make up all other colors on a computer
display monitor.
rich text format a standard for developing text documents created by Microsoft
that uses the encoding of formatted text and graphics for easy transfer between
applications. Other document encoding formats include HTML and SGML.
right click to press the button on the right hand side of a mouse. With the mouse
cursor on an object, right clicking will often produce a pop-up menu that, de-
right justify 120
pending on the object selected, offers options that can lead the user to open a
program, cut or copy, create a shortcut, or display the properties of the selected
object.
right justify to orient text so it conforms to a vertical margin on the right side of a
document.
Ring Master the individual who manages and maintains hyperlinks in a Webring.
robust stable performance under most circumstances, even those which are less
than optimal. Also occasionally refers to software allowing a user many sophis-
ticated and unique features. In software parlance, opposite of brittle.
roll up window a dialog box that offers the user program tools or options and can
be moved to a position of convenience.
Roman a common font type with serifs and vertical orientation. see Times New
Roman.
121 run
root directory sometimes simply called root, the main directory of a disk from
which all other directories, folders and files are derived. see directory.
Rot13 (Rotate 13) a simple method of encryption used on the Internet to conceal
secrets, the answers to contests and puzzles, and potentially offensive mes-
sages. Each of the first 13 letters of the alphabet are assigned a number, so that,
A=1, B=2, etc.
router hardware and/or software that connects networks and facilitates the smooth
transfer of data by filtering messages and directing packets.
RPM (Revolutions Per Minute) the number of revolutions a disk turns per minute.
ruler in graphics and some word processing programs, a line containing desig-
nated points running on the top and the side of the display screen used to
measure, place objects and text, and accurately identify specific points on a
document.
Sad Mac the frowning Macintosh icon indicating the computer cannot boot due to
a possible hardware problem.
safe mode a temporary method of running Windows using the absolute minimum
in resources. In the event of a hardware failure or malfunction, it can become
necessary to run the operating system in the Safe Mode. In safe mode, it is
sometimes possible to back up files and otherwise rescue data that is subject to
loss due to eminent hardware failure. Windows is often able to alert the user to
such problems before they actually occur. It would be wise to print out the
instructions for Safe Mode operation prior to needing them. To do so, go to
Start, Help, type “Safe Mode” into the keyword prompt box, click on Display
and print the instructions for safekeeping.
sans serif type without serifs. Popular sans serif fonts include Helvetica and Arial.
saturation the degree of intensity of a color. Deep vivid color is said to be saturated,
while decreasing saturation causes the color to fade.
119 screen capture
save to transfer data from memory to a more permanent storage medium such as a
hard disk, floppy or tape. When a program prompts a user to save work, the
transfer that occurs is usually to a file or folder on the hard disk.
Save As the option to save a file under a different name, format, or in a different
folder. The Save As option comes in particularly handy in word processing
functions when variations of a single document must be created.
scale also called sizing, to change the size of a graphical image without distorting
its shape. Most vector oriented graphics programs allow for scaling by select-
ing the image and dragging a corner handle diagonally.
scan to convert pictures, text or images into digital data by running them through
a scanner. see optical scanner.
ScanDisk a DOS and Windows diagnostic program that searches for hard disk
errors. see Defrag.
screen capture to copy the image currently displayed on the screen to the clipboard
for use in another file or document, or to print. In Windows, pressing the
screen saver 124
Print-Screen key saves the screen’s contents to the clipboard. Holding the Alt
key while pressing Print Screen captures only the active contents of the screen.
In Macintosh, holding down Command and Shift while pressing 3 places a
bitmap screen image in the root directory under PICT.
screen saver a program that displays an animated picture or pattern when the
computer has not received input from the keyboard for a specified period. Screen
savers were originally used to prevent “screen burn” or ghosting, a condition
that caused the screen’s inner coating to wear from images or text that was
constantly present. Modern display screens are no longer subject to this condi-
tion, yet the screen saver has retained it’s popularity. Many interesting and
unusual screen saver patterns are included in both Macintosh and Windows
operating systems as well on thousands of Websites for free downloading.
scroll the systematic movement of text or images, either up and down, or from side
to side on a computer display screen with the use of the keyboard arrow keys,
or a mouse. In scrolling down, a new line of text appears at the bottom of the
screen as the line at the top disappears. To scroll up and down using a mouse,
the user would place the mouse cursor on the scroll bar (a sliding rectangular
button located on the right of the display), or on a stationary arrow button at
either the top or bottom of the frame. In using the arrow button, the user would
position the cursor on the button, left click, and hold the mouse button down.
The contents of the screen will move up or down accordingly. To scroll using
the sliding button, the user would place the mouse cursor on the button, left
click the mouse, and leave the button pressed while moving the mouse either
up or down. This causes the screen contents to move at the same speed as the
mouse. To scroll using the arrow keys, a user simply presses the key that corre-
sponds to the desired direction of the screen contents.
scroll bar a rectangular sliding button located either on the right side and/or the
bottom of a computer display screen used to move the screen’s contents accord-
ingly. see scroll, Figure S.03.
Scroll Lock key a special key on PC and Macintosh keyboards whose function
varies depending on the program running. see Special Key Functions, page 281.
scroll bar
arrow button
search and replace the ability for a word processing application to find a specific
word or phrase and replace it with another. Most programs will either auto-
matically replace every chosen character string, or give the user the option of
approving each of the changes. In Macintosh compatible software this feature
is called find and replace.
search engine computer software that, through the use of bots and by seeking out
keywords, searches an extremely large number of documents and locations on
the World Wide Web and Internet for specific information. After searching for
sector 126
information related to the word or words used in the search, the program com-
piles a page of results, listing hyperlinks pointing to Web pages that contain
(hopefully) the desired information. Although “search engine” refers to the
actual search software, the term is often associated with a specific service such
as Alta Vista or HotBot. Understanding how to ask a search engine for the
desired information can minimize the frustration sometimes experienced with
using such a service. see Search Engine Tips, page 275.
sector the smallest unit of data storage available on a disk. A disk is divided first
into tracks then into smaller units called sectors. A track is similar to an
individual recording on a vinyl record album. A sector would be represented as
a diagonal portion, or cross-section of a track.
sector
track
security a wide range of measures taken to guard computer systems, as well as the
storage and transmission of data. Among the many security measures taken to
ensure that data doesn’t fall into unauthorized hands, are the implementation
of firewalls, the encryption of information, passwords and security keys for
users of institutional and personal secure systems, and the isolation and guard-
ing of mainframe computers so unauthorized personnel do not have access to
them. see firewall, encryption.
seek time the time it takes a device to call up a particular file or other piece of
information, usually measured in milliseconds.
serial the transfer of data over a single line, one bit at a time.
serial port a computer or other hardware device interface that allows for serial
transmission, that is, one bit of data at a time, over a single line. Modems,
mice and printers (printers also use parallel port connections) all utilize serial
port connections. Most computers have two such interfaces labeled COM 1
and COM 2.
serif a decorative adornment to a type character such as the one used in the main
body of this book, Times New Roman. Some feel that serifs allow for easier
reading. see Figure S.06.
server a network computer (and/or software) that performs a wide variety of func-
tions such as delivering data to client computers. Servers store and deliver,
upon demand, files to other computers on the network. A Web server, for ex-
server mirroring 128
ample, stores Web pages that are simply files. When a Web browser, prompted
by a user, sends a request for a particular page, the server calls up the file from
its hard disk and sends it to the browser over the network. Web servers need to
have large data storage disks to store multiple pages. The term also refers to
computers other than Web servers. A server on a LAN might maintain files
needed exclusively by the users of that network, while an e-commerce server
would maintain and deliver data essential to the transfer of funds for commer-
cial transactions on the Internet.
server mirroring maintaining a computer that has the exact same files contained
by a primary server for the purpose of backup in the event of failure or mal-
function by the primary machine.
service provider 1. a company that provides a wide variety of online services via a
Website. 2. sometimes used to refer to an Internet Service Provider (ISP), a
company that provides customers with Internet access or Web hosting. see
online service, Internet Service Provider.
servlet a Java applet that runs on a Web server. Servlets are slowly replacing CGI
applications because of their versatility. Unlike a CGI program, an applet is
opened by a Web browser and stored in memory so that each time it is needed
it is available without the need to reload. CGI scripts must load each time
utilized, taking more time than servlets. see applet, CGI.
session refers to the time spent using a computer. For example, an online session
would be the time a user spent connected to a network.
SET (Secure Electronic Transaction) a widely accepted standard that uses digital
signatures allowing for secure credit card transactions over the Internet.
setup to install computer hardware or software. Most hardware and software pro-
grams include a mini-program or setup file that configures an operating sys-
tem so it will accept the new device or application.
shell also called user interface or command shell, the part of an operating system
that processes user commands and allows them to be executed.
shift click to hold the shift key down while left clicking the mouse. In some appli-
cations this allows a user to select more than one item.
Shift key a computer keyboard key that when pressed at the same time as another
key (much like the typewriter Shift key), changes the function of the other key.
see Special Key Functions, page 281.
shortcut key some keys allow a user to execute certain functions easily. For ex-
ample, pressing Control and the “P” character, brings up the “Print” dialog
box while Control and “S” saves your work. see page 281.
shout to post a message in any online forum with the Caps lock key on. Using all
caps is considered bad netiquette.
shut down to properly turn off a computer. In the Windows operating system, select
Start either by left clicking on the icon or pressing the “Windows” key, select
Shut down, and press Enter or left click the mouse.
sig file short for signature file. A small file, attached to every email of a particular
sender that consists of a special group of characters, words, symbols, etc. that
acts as the users signature.
sig quote similar to a signature file except the attachment is a quote or saying
attached to outgoing email. see sig file.
single-sided disk a floppy disk that is able to store data on only one side.
sleep mode a computer setting where, usually after a pre-set idle period, the com-
puter shuts down unnecessary operations such as the display monitor and disk
drive. The sleep mode is designed to preserve energy.
SLIP (Serial Line Internet Protocol) a standard for using a modem and telephone
to connect to the Internet. see PPP.
slot synonymous with the term socket, an opening where a plug-in circuit board
(often referred to as a card) may be attached.
ment. Smalltalk had a profound influence on the development of both the Apple
Macintosh and Microsoft Windows operating systems.
smart terminal a keyboard and display monitor system containing a small amount
of processing power, allowing the terminal enhanced functions. A dumb ter-
minal has no processing capabilities.
smoke test a slang term referring to the first time a computer is started. The pun is,
“Will smoke come out?”
snail mail a slang term used to describe tangible physical letters or packages deliv-
ered by the postal service. The term came into being when email became popu-
lar. Snail mail is so named because of its slow delivery time as opposed to
email. A snail address is the place where snail mail is received.
sniff to monitor information packets en route over a network using hardware and/
or software. A device or system designed for this purpose (called a sniffer) may
be used both by unscrupulous people trying to gather data for the purpose of
theft or unauthorized entry to a system, or by a network system manager for
legitimate monitoring purposes.
SNMP (Simple Network Management Protocol) a set of protocols used for commu-
nications software and devices such as switches and routers connected to a
TCP/IP.
Although the disk containing such data is considered hardware, the actual
data, being intangible, is termed software. Software is synonymous with the
term application, which refers to a program that actually produces results for a
user such as a spreadsheet or word processing program. System software re-
fers to an operating system such as Windows or Linux. The terms application,
utility, and program are often used to describe software.
SOHO (Small Office Home Office) often refers to individuals working from home
(and the many resources available to them), one of the largest markets for
computers, supporting devices, and software.
solution a popular Internet and computer marketing buzzword that refers to what a
particular device or application can do for a user.
sort to arrange items such as records, individual words, or files in a specific way.
For example, the names in a telephone directory would be sorted alphabeti-
cally.
sound card a printed circuit board that allows a computer to record and play sound
such as stereo music and MIDI files. Although generic sound cards come as
standard equipment with most off-the-shelf computers, the term implies an
added feature, as a card is an expansion (circuit) board.
sound player a component of a Web browser that allows a user to play sound.
source a common computer term meaning the point of origination for any number
of data items such as files or folders. For example, if a file were to be copied
from a computer’s hard disk to a floppy disk, the source directory would be the
hard disk while the destination or target would be the floppy. Source is the
opposite of target.
133 spell check
spam unsolicited commercial offers sent via email or posted to an online public
forum such as a news group or message board. Spam is electronic junkmail
sent usually to a large mailing list. It is widely considered a nuisance because
spam consumes both time and considerable bandwidth. However, some feel
that the campaign against commercial mass emailing is overblown consider-
ing the ease with which a recipient can dispose of the message (a mouse click
is all it takes). Spam can become particularly annoying when it provides a link
to a pornographic Website that children can access. It is unclear where the
term originated, though it is thought to have come from either Monty Python’s
ditty that repeats the word spam, spam, spam... thus, the reference to dupli-
cated messages, or from the processed meat product produced by Hormel that
some consider unpalatable.
speech synthesis software with the ability to read text files and translate the text
into spoken words. Although unable to mimic a human voice perfectly, many
such applications do a commendable job of generating recognizable speech in
both male and female tones. Speech synthesis applications are also used for
automated telephone inquiries. For example, a credit card holder can call a
customer service number almost any time of the day, and after keying in his
account number, receive computer generated information in the form of syn-
thesized human speech. Additionally, speech synthesis can be particularly
useful for sight-impaired individuals.
spell check a feature found in many text oriented software applications such as
word processors that scans the text in a document and alerts the user to mis-
spelled words, many with the ability to offer suggestions for the correct spell-
ing. Such a program needs to maintain its own dictionary. A small drawback
to a spell check feature is that many don’t recognize a misused word that is
correctly spelled, such as the words there and their.
spider 134
splash page also called a doorway page, the first page a user often comes upon
when arriving at a Website, though usually not the Homepage. Often the
splash page displays a paragraph or two describing the site’s contents. The
purpose of such a page is to incorporate keywords and phrases that will get the
site listed on the major search engines. A Website may have several splash
pages, each using a different set or a combination of keywords, with the inten-
tion of picking up more and higher search engine ratings.
split screen the division of a display screen into two or more frames each display-
ing a different document or different portion of the same document.
spoof also called spoofing, to fool or trick. In online data transmission (called IP
spoofing), to make a message appear as though it originated from a user or
computer other than the one that actually generated the message.
spooling to order items or jobs in a queue before sending them to an output device
such as a printer. Spooling furnishes a waiting area for documents to pause
while waiting for the printer to accommodate each item in the queue.
spot color the use of a specific color of ink in the production of an image rather
than the combination of the four basic colors (cyan, magenta, yellow and black)
used to simulate the desired color.
spray can a tool available in a paint program that applies color much like a spray
can in the real world. That is, when used, it disperses color sparingly first
using a fine mist. To add density, the user must concentrate the application by
spraying more in the same area. The concentration of color depends on how
quickly the can is swept over the desired surface while using a mouse.
cal calculations, which will automatically adjust values as new data is added.
Spreadsheets can be created using three-dimensional features and color to ac-
cent specific items.
sprite used in video games and animation, an image within a larger graphical
image that moves.
SSL (Secure Socket Layer) a protocol used by Netscape utilizing encryption, and
ensuring the secure transmission of data between client and server.
stack in programming, a set order of prioritizing tasks (also called last in, first out)
where each additional item is added to the top of the order and acted on first.
standard a value by which other values are measured. A standard may either be
official and endorsed by an organization of some type, or unofficial and
simply accepted as an industry-wide rule. Standards are important when con-
sidering computer hardware and software because, among other things, they
star 136
ensure that devices are compatible and can be used together. Among the orga-
nizations setting computer standards are, Video Electronics Standards Asso-
ciation (VESA) and American National Standards Institute (ANSI).
star the computer keyboard character (on the main body of the keyboard) sharing
space with the number 8, also called the asterisk. On many keyboards such as
the numeric keypad, it has its own key. A star key is also present on push-button
telephone keypads. The star or asterisk (*).
star network a local area network (LAN) in which nodes are connected to a central
computer.
Start In the Windows operating system, a menu activated either by a desktop but-
ton located in the lower left side of the display monitor, or a keyboard key
displaying the Microsoft logo (sometimes called the Windows key). Activating
137 subscribe
either brings up a menu that allows a user many options such as starting a
program, changing system settings, finding files, or shutting down the com-
puter. The Start menu can also be displayed by pressing the Control and Esc
key at the same time.
Start menu in Windows, the menu that is displayed by pressing the Start key on
the computer keyboard or clicking the Start button in the lower left section of
the display screen. see Start.
startup disk a disk used to start or boot a computer. Under normal conditions,
a computer boots using operating system instructions on the hard drive. In
the event a hard drive is damaged or otherwise compromised, it is necessary
to boot from a floppy disk. To create a startup disk:
1. Insert a fresh floppy into the floppy drive.
2. Select Start, Settings, Control Panel.
3. Open Add/Remove Programs.
4. Select Startup Disk, and click Create Disk.
5. When finished, label Windows (version...) Startup disk,
and store in a safe place.
StuffIt a Macintosh data compression application from Aladdin Systems that al-
lows a user to combine more than one file into a single file.
style sheet in word processing, desktop publishing, and Web design applications, a
set of parameters determined and set by the user that define the overall look
of a document or Web page such as margins, fonts, and headings.
stylus a writing or drawing tool shaped like a pen found in paint and graphics
programs.
superscript a character, smaller than those in the main body of text appearing
above the baseline. For example, 103 = 10x10x10.
supertwist a high contrast liquid crystal display (LCD) which uses technology that
twists light rays, changing their polarization, producing a high resolution im-
age.
super VGA video graphics with higher resolution than VGA. Display monitors re-
ceive instructions from a video card that, among other functions, allow for
color display and screen resolution. VGA (Video Gate Array or Video Graph-
ics Adapter) was a standard introduced by IBM in the 1980s that had a maxi-
mum resolution of 640x480 pixels with 16 colors. Although SVGA features
differ according to individual manufacturers, the standard allows for resolu-
tions of up to 1600x1200 pixels and color display capabilities from 256 colors to
16 million colors. Standards for video display are reviewed by a number of graph-
ics manufacturers known as the Video Electronics Standards Association (VESA).
surf (surfing) refers to the casual browsing of Websites and online discussion fo-
rums with no particular purpose or destination. Because virtually all informa-
tion on the World Wide Web is linked, surfing is as easy as pointing a mouse
and clicking.
139 system software
syntax the instructions or guidelines by which computer language (as well as spo-
ken and written language) is constructed so it has meaning. Computer lan-
guage has its own set of spelling and grammar rules.
system any number of computer devices and software applications working to-
gether to accomplish a specific goal. For example, a Web designer would prob-
ably have a system consisting of a high speed computer with plenty of disk
storage, one or more Web page development applications, an optical scanner, a
high resolution display monitor and printer.
system software operation software applications designed and written for com-
puter systems that perform specialized functions.
T
24/7 abbreviation for an enterprise operating 24 hours a day, seven days a week.
T1 line a leased telephone line connection allowing for the transfer of data at a
speed of 1.544 Mbits (1.544 million bits) per second. Though not fast enough
to accommodate realtime streaming video, a T1 connection is often used by
businesses to connect to the Internet.
T3 line a leased telephone line connection allowing for the transfer of data at a
speed of approximately 45 Mbps (45 million bits) per second. T3 connections
provide the bandwidth for realtime streaming video. T3 lines comprise much
of the backbone that allows for the transmission of data over networks such as
the Internet. Many ISPs use a T3 connection to provide services to customers.
see bandwidth, backbone.
Tab key a useful computer keyboard key that moves the cursor to a new insertion
point as determined by a user’s margin settings. The tab key also brings a user
to a new field when making entries in a cell or dialog box (form).
tab stop a designated point set by a user that positions the cursor in a particular
spot on a page. In word processing, tab stops can be useful for setting recurring
margins, paragraph indentions, and other repeated parameters in a document.
tape a magnetically coated material used for the storage of computer, video, or
audio data. The advantages of storing computer information on tape are that
tapes can store large amounts of data and are less expensive than disks. The
drawback to using tape is slow running speed. Tape is the preferred method of
storing information that is not needed frequently such as archived data.
tape drive a device that reads and/or writes data onto a tape. Accessing data on
tape can be time consuming depending upon the location of the information.
For example, a tape drive would need to fast forward through a large quantity
of tape to access data stored in the middle of a spool.
talk realtime online chat (replete with all of the familiar abbreviations and acro-
nyms) that takes place in a virtual community of which there are many, accord-
ing to an individual’s interests. As with most other communication forums,
regular participants take the medium seriously and discourage poor netiquette.
In some talk forums, administrators monitor discussions.
target also referred to as destination, the program, file or final location for com-
puter data that is being transferred or copied. Target is the opposite of source.
taskbar in Windows, the panel on the bottom of a display monitor that contains
icons, beginning with the Start button on the far left, that provides shortcuts to
opening selected applications. The taskbar also displays the symbols represent-
ing folders, programs, and/or files that are presently open. It is also home for
the volume control and displays the current time. Clicking on an item in the
taskbar brings that item to the foreground.
TCP/IP 142
television board an expansion board that allows a computer and monitor to act as
a television. Some allow a user to place a small TV picture in a corner of the
monitor screen while using the computer for other work. A television board
might also be called a TV card.
telnet a program that allows a user to log onto a remote server or host. For ex-
ample, if you were away from home, and connecting to your ISP required a
long distance call, you could use telnet to connect and avoid the charges. You
would need a user name and password and would have access to services nor-
mally offered by your home ISP such as email.
template a model or pattern. The word is used to describe several functions with
regard to software applications and graphical layout. For example, in a word
processing application, a template might refer to a style sheet, in that the layout
for a document is set before beginning work. Entering information into pre-set
fields is all that is necessary to create the framework for the document. The
same could apply to entering information into a spreadsheet. In graphic or
Website design, a template might be used to maintain a uniform theme through-
out the creation.
143 thermal printer
Texas Instruments a global semiconductor company and the world’s leading de-
signer and supplier of digital signal processors and analog integrated circuits,
the engines driving the digitization of electronics. These two types of semicon-
ductor products work together in digital electronic devices such as digital cellu-
lar phones. In 1958, Jack Kilby, a researcher for Texas Instruments, developed
the first integrated circuit. In 1967 the company introduced the first hand-held
electronic calculator.
text characters, numerals and symbols that make up sentences and paragraphs.
text box a designated area within a software program or Web page where a user
may enter text.
text file a file containing primarily text. A word processing document however, is
usually not simply a text file. Word processing files are different because they
incorporate items such as boldface and italic characters, margins, underlined
words, and many other variables that set them apart them from text files. A true
text file is one where the sentences have no special characters or uniformity such
as margins or columns. Some word processing programs allow a user to save
documents in a “text only” or an ASCII format, allowing for easy uploading
and downloading to others.
text wrap also called text flow, a feature supported by many word processing pro-
grams allowing a user to enter text around a picture, clipart or other image
placed on the page. see Figure T.03.
thermal printer a low cost printer that produces characters and images using heat
applied to a special type of paper. Calculators and some fax machines employ
this technology.
thrash 144
thrash to move about wildly without accomplishing anything useful. With comput-
ers, thrashing occurs when too many programs are open and the system does
not have the resources to accommodate them all. Closing one or all applica-
tions will get things under control. A more permanent solution is to install
more memory.
thread a series of posted messages of the same topic found on a bulletin board or
newsgroup. It is often possible for a user to call up all of the messages associ-
ated with the original.
TIFF (Tagged Image File Format) a popular file format for saving bitmap images
on both PCs and Macintosh computers. The TIFF format can store large im-
145 token
ages, black and white graphics, unlimited color, and can display an image in
any resolution. TIFF files are identified by the .TIF file extension.
TLD (Top Level Domain) the suffix attached to Internet domain names such as
.com, .net, org, uk, .ws .cc, etc. As the Internet grows in popularity and domain
names become increasingly scarce, new TLDs are being created.
Tillamook an Intel processor designed for use in portable computers. The Tillamook
chip is a version of the Pentium that runs at more than 200 MHz.
time out after waiting for an answer, a program or hardware device will often
display a time out message and abandon the function. For example, when ac-
cessing computerized stock quotes on the telephone, the program will ask for
the user’s account number. If it isn’t given within a certain period of time, say
30 seconds, the computer might return the user to the main menu or even
disconnect.
time sharing refers to more than one user having access to the same computer.
Time sharing utilizes the multitasking concept, that is, that a computer rapidly
switches processing duties among two or more open applications.
Times Roman a popular font style noted for its legibility both on the printed page
and on a Web page. The font is characterized by its vertical orientation and
serifs. The vast majority of type used in this book is Times New Roman, a slight
variation to the original Times Roman.
title bar the uppermost rectangular bar in the frame of a program or Web page
containing the program title or file name, and possibly an icon that identifies it.
toggle a term used to describe several actions. Primarily, to toggle means to switch
functions from one to another. Occasionally people refer to clicking hyperlinks
while surfing the Internet as toggling through the Net.
toner electrically charged ink-like power used in copiers and laser printers. Toner
is available in disposable cartridges for both printers and copy machines or
may be added to a reservoir as needed.
tool one of any number of utility function devices available in a software applica-
tion allowing a user to accomplish useful work. Often a tool can be manipu-
lated with the mouse cursor. For example, in a paint program, the spray can,
scissors, and pen are all tools.
topology refers to the manner in which individual items or points are connected. In
networking, topology usually refers to the arrangement of computers connected
in the network. see local area network for network configurations.
touch screen a display monitor that, when running with certain software allows a
user to make selections and input data into the computer by touching the screen
with a finger. Touch screen technology is often used in kiosks.
tower computer components are assembled inside of a metal box. Tower refers to a
box that is taller than wide. The advantage of a “tower model” computer
versus a desktop model, is the tower saves space. see PC.
track a circular section on a data storage disk containing data, resembling a single
musical selection on a vinyl record album. Data storage is further isolated into
sectors.
sector
track
trackball a device similar to a mouse used for pointing to and clicking on items on
a display monitor. The difference is the trackball has a free-moving ball that is
housed in a socket in the device. The user rolls the ball to position the cursor
while the device remains stationary.
traffic 1. refers to the number of communications being sent over a system or net-
work. The extent of traffic sometimes determines a users ability to login and
navigate a network. 2. the frequency and number of visits received by a Web
page or Website.
transfer interrupted 148
transfer interrupted a message box appearing on a display monitor after the down-
loading of data has been stopped. A user may have pressed the stop button, or
the source server may have shut down for any number of reasons.
transfer rate the speed that data travels from one hardware device to another,
either through conventional wire and cable connections, or over a network.
Factors such as network traffic, the type of data being transmitted, and indi-
vidual computer speeds affect the transfer rate.
Trash the folder in the Macintosh where deleted files are kept until they are perma-
nently cleared or restored. The Trash bin in the Mac is the equivalent to the
Recycle bin in the Windows operating system.
tree a data storage structure where new items are attached to elements below them.
The first item in the structure is the root. The connections are called branches.
see dir, directory, root directory, hierarchical.
Trojan horse a program downloaded from the Internet that contains destructive
elements to a computer. Unlike a true virus, the Trojan horse does not replicate
itself, it simply erases the users hard drive. A Trojan horse can come disguised
as a useful application such as a game or even a virus protection program. The
name is taken from Greek mythology, where the Greeks gifted their Trojan
enemies, a large wooden horse as a peace offering. Once inside the city of Troy,
Greek soldiers, who were hiding inside the hollow horse, opened the gates to
the city allowing fellow soldiers to invade.
troll sometimes referred to as flame bait, a message posted to any number of public
chat or bulletin board forums that is designed to prompt a large number of re-
sponses. Often the message is a complete exaggeration, lie, or insult. One might
be said to be “trolling” for a particular type of response.
149 typeface
tron to communicate online and not through more conventional means such as
telephone or face-to-face.
true color a graphics application using at least 24 bits for each pixel of color. True
color applications are able to display more than 16 million colors.
tune to clean up hard disk space by deleting old files and otherwise run applica-
tions that improve the speed and efficiency of a computer. Running a
defragmentation utility would be one method of tuning a computer.
turnkey system a computer system that is designed for a particular application and
comes to the user ready to perform certain functions. For example, a desktop
publishing system would come with publishing, scanning, and printing drivers
as well as the appropriate hardware and software. A user could figuratively
turn a single key to be up and running.
tweak to adjust, align, manipulate, or otherwise fine tune a hardware device or soft-
ware application for maximum efficiency.
typeface a particular design for characters such as Courier or Times New Roman.
The two major distinctions that separate typeface styles are Serif and Sans serif.
see sans serif, serif.
U
UI (User Interface) the part of an application the user experiences as opposed to the
internal functioning of the program.
undo a command included in many word processing and graphics software appli-
cations that allows a user to eliminate or reverse the last action. For example,
say you’ve just applied a moustache to the Mona Lisa with your new paint
program. You then decide you like the painting better the way it was originally.
With a click of the undo button or command, the moustache is gone. In many
Windows compatible programs, pressing the Ctrl and Z keys together will ac-
complish the same thing as the undo feature.
undocumented features included in a program that were not described in the users
manual. Sometimes undocumented items are left out unintentionally. Some-
times undocumented features were present to facilitate the writing of the
program by the designers and programmers and thought to be unimportant
to the end-user. Other times, such features are present as part of a test in
determining whether they will be included in future versions of the program.
uppercase keyboard characters that are “large” or written in capitals such as X YZ,
as opposed to small letters, x y z. The term dates back to the early days of
printing when the capital letter characters were stored in drawers (cases) above
the small letters.
user an individual, with an experience level that might vary from novice to expert,
who operates a computer and/or other hardware devices.
user-friendly any software or hardware that allows for easy operation by a user.
Operating systems using graphical user interface features such as menus, but-
tons, onscreen clickable items, and a mouse all contribute to the degree of user-
friendliness of home computers.
uunecode a UNIX utility program used to convert binary files into ASCII for the
purpose of posting to a newsgroup or sending email attachments.
V
vaccine utility software that protects a computer from viruses by running a system
check periodically or each time the computer boots.
vanilla a slang term used to describe a computer or software program without extra
features ( bells and whistles). The term infers that vanilla is considered plain.
vaporware a slang expression that refers to software that is announced, and pro-
moted but never makes it to market.
variable pitch refers to a typesetting style that places characters closer together or
farther apart depending on the space available for them. Variable pitch is a
method used to ensure that documents are centered and justified.
Veronica a search engine that uses a spider to locate information compiled by Go-
pher. see Gopher.
vertical portal an entry point to the World Wide Web providing a wide variety of
online services. The difference between a vertical portal and a simple portal is
specialization. Vertical portals try to cater to the needs and desires of a particu-
lar group of consumers or in the case of business-to-business, a particular in-
dustry or business group. see b2b, portal.
VGA (Video Gateway Array or Video Graphics Array) video monitor technology
developed by IBM that provides for a maximum resolution of graphical images
of 640 x 480 pixels with 16 colors. For text, VGA provides a resolution of
720 x 400 pixels. see SVGA.
video adapter sometimes called video card, a plug-in circuit board that gives a
computer video display capabilities. The ability of a computer to produce video
will depend not only on the adapter but the monitor as well. Most video cards
contain some memory so the computer’s RAM is not called upon to store im-
ages. A video adapter allows the computer to display both text and graphics.
Some also offer the user a choice of resolutions.
video capture refers to a device that converts analog video signals to digital and
stores them on a hard disk.
video conferencing using a computer, video camera, and network such as the
Internet, to conduct a live conference between two or more people. Video
conferencing is an extremely useful method of communication because it saves
people the time and expense of travel and can often accomplish many of the
things a physical meeting can. A two-person videoconference is known as
point-to-point, while more than two people involved in a session is a multipoint
conference. Until recently, video conferencing was prohibitive due to the costs
of the equipment required, however, hardware costs have become more afford-
able within the recent past.
video memory the memory found in a video adapter that stores images as bitmaps
before they are sent to the display monitor. Because displaying video images
requires a great deal of computing speed and memory, the video adapter is
equipped to handle this function rather than relying on the computer’s CPU.
There are several types of video memory such as VRAM and WRAM.
155 virtual server
video mode the setting of a video adapter. The mode will be set to either video, for
displaying images or to text for displaying ASCII characters.
viewer a program whose primary purpose is for the display of graphic files.
viral marketing refers to the promotion of products through word of mouth and
email. Viral marketing, however, is not related to spamming, but to small groups
of people sharing exciting information via email. For example, the popular
movie The Blair Witch Project was a success due to the buzz created over the
Website and the upcoming movie, months in advance of its release.
virtual hosting a server that stores more than one Website on its hard disk and
offers them to users on the Internet is said to be a virtual hosting service pro-
vider. Virtual hosting is the opposite of dedicated hosting. This is an arrange-
ment where a single Website is stored on a single server and does not have to
share space with other sites. Problems do not usually arise unless a site being
hosted by the virtual server begins to pick up a significant amount of new
traffic. This can slow access to all pages hosted there. Offering Web pages
using virtual hosting is far less expensive than using a dedicated service.
virtual reality a realistic environment often used for entertainment, created using
computer hardware and software that stimulates the human senses of sight,
sound, touch an occasionally taste and smell. The user wears special glasses or
goggles, gloves, and headphones. A virtual reality experience uses three dimen-
sional images, stereo sound, and tactile stimulation to give the user a feeling of
actually living through a physical experience.
virtual server A server that stores and delivers more than one Website. see virtual
hosting.
virus 152
virus a program or string of code that gets inside a computer and replicates itself
often causing destruction along the way. Even if not designed for destruction,
such as erasing or changing data, a virus can be dangerous because as it contin-
ues to duplicate, it uses up valuable disk space until it crashes the system.
Viruses can be found on any computer storage medium such as a hard disk,
floppy, zip, or CD-ROM. As viruses become more widespread, prudent com-
puter owners should protect themselves by installing virus scan software. These
programs are designed to search the computer’s disk drives each time the ma-
chine is booted and destroy any virus found. As many viruses are introduced
through email (a virus cannot be introduced simply by reading an email mes-
sage, only by opening attachments), users should only open attachments re-
ceived from people they know, and even then, do so with caution.
virus protection software also called virus scan software and vaccine, utility soft-
ware installed on a computer designed to locate, identify, and eliminate vi-
ruses. Each time a computer is booted the virus scan searches the system for
viruses and destroys them. No vaccine is 100 percent guaranteed effective be-
cause new viruses are being created all the time. Many virus protection pro-
grams offer periodic updates for free. McAfee and Norton Utilities are popular
software makers offering virus protection software.
voice recognition the ability for computer software to understand and respond to
the spoken human word. see speech recognition.
wait state the time that passes while a microprocessor reads data from memory. A
wait state usually occurs when the processor speed is faster than the memory
capacity and speed.
warez pirated commercial software made available to the public on the Internet or
through personal contact. see piracy, software piracy.
watch icon in Macintosh, the cursor changes to a wristwatch while the program is
processing, indicating that the user must wait for the function to complete. The
watch icon is the equivalent of the hourglass in Windows.
WAV the format for storing digital audio files developed as a joint venture by IBM
and Microsoft. A WAV player was first introduced to the public in Windows
95. The file extension or suffix for a WAV file is .WAV.
Web developer an individual who creates the layout of a Website. Among the
considerations for developing a commercial site would be, ensuring the mer-
chant can accept payment online, logical links to products, and easy naviga-
tion through the purchasing process. A Web developer is sometimes referred to
as a websmith.
webmaster an individual who maintains Web pages. The webmaster’s duties might
include creating a site, updating pages, maintaining the hardware to keep a
site operational, responding to user inquires, fulfilling orders on a commercial
site, and monitoring site traffic using specific software designed to count hits,
and impressions. For especially large Websites, a webmaster might employ a
team of assistants. A webmaster might also be called a websmith, webmistress,
or Web guru.
Web page a document posted on the World Wide Web containing a URL. A user
may call up a Web page by typing the URL into the address field of a Web
browser.
Web page design the creation of Web pages for individuals and companies want-
ing a presence on the World Wide Web. Web design incorporates the knowl-
edge of how users access particular types of information, and delivers it that
way. For example, people are likely to return to a site repeatedly if valuable
information is offered and updated daily or more frequently. Additionally, ease
of navigation and wise use of graphics come into play. As businesses scramble
to establish a presence on the Web, good site designers are very much in de-
mand and command healthy salaries.
Website a Web page, usually associated with a group of related pages, connected
by hyperlinks, located on the World Wide Web. A Website may exist for a
number of reasons. It is possible for an individual to put up a site that displays
family photos for the world to see. The many branches of government maintain
Websites to allow citizens easy access to information and services. There are
sites for users to play games, view cartoons, and access information of all types.
Perhaps the most common of all Websites is the commercial site. Here users
from all over the world can purchase a wide variety of goods and services from
home and pay using a credit card or some other method of online cash transfer.
WebTV the ability to access the World Wide Web using a television and telephone
or cable lines. Web pages viewed in this way are occasionally slightly distorted.
WebTV is an easy way to access the Internet. However, computer functions
such as the ability to download programs, and post to message boards is not
available with WebTV.
What’s this? a help feature included in Windows 95 and newer versions that al-
lows a user to place the mouse cursor on an item and have a small box appear
with a brief description of what the item does.
widow in word processing and publishing, the first line of a paragraph appearing
on the last line of a page. Some applications adjust for this. Widow is synony-
mous with orphan.
Windows 2000 the most recent of the Windows operating systems, however, not
the logical evolution of Windows 98. Windows 2000 comes in four versions all
with a professional or business flavor to them. First, there’s Windows 2000
Professional, designed using NT Workstation, it incorporates the familiar Win98
interface with speeds of up to 30 percent faster than the previous version. The
other versions are Windows 2000 Server, Advanced Server, and DataCenter
Server. These systems are set up to offer networking capabilities that many
home users will not need. Windows 2000 is faster, more crash resistant, and
allows for easier Internet access than any other version of the operating system.
(Of which Windows 2000 was born) and Windows NT Server, designed for use
in networking.
wireless modem a modem that accesses a wireless telephone system (as do cellular
telephones) to provide a connection to a network.
wizard a utility included with a software application that helps a user perform
certain functions. Wizards are often used to set a program up for installation.
They also provide templates that allow a user to enter required information to
create documents such as Web pages, letters and spreadsheets.
Word short for MS Word, one of Microsoft’s word processing programs. There is
also a version available for Macintosh users.
WordPerfect a popular word processing application that can be used on both Win-
dows and Macintosh. WordPerfect is versatile in that it supports many differ-
ent file formats and includes a wide range of different characters. Among these
are full alphabets for Russian, Hebrew and Japanese.
word processing the use of a computer to create word documents such as letters,
books, news articles etc. The computer must have a word processing program
installed. A user can easily set up the layout of a wide variety of documents
with little training. One very distinct advantage of using a computer to create
word documents versus a typewriter is the ease with which corrections can be
made with a word processor. Moving text around and the storage of documents
also adds to the benefits of computerized document creation. Word processing
is probably the most popular use for computers.
word processor a program and/or hardware that allows a user to create word docu-
ments. Before the widespread popularity of personal home computers, word
processing machines (the combination of hardware and software all in one
device) existed for the sole purpose of word processing.
word wrap a word processing feature that makes text conform to margins so words
do not continue forever. This is the feature that brings the cursor to the next
workstation 162
line without a user having to press the Enter key. For certain types of documents
the word wrap feature may be disabled.
World Wide Web (WWW, W3) an extremely large group of computers linked to-
gether utilizing many networks, offering information to users via Web servers
and browsers. Most of the information found on the Web is formatted in a
programming language called HyperText Markup Language (HTML) and trans-
mitted using Hypertext Transfer Protocol (HTTP). Navigating the World Wide
Web is often as easy as clicking a hyperlink located on one Website leading to
another. Though the terms Internet and Web are used interchangeably, there is
a distinction between the two. The Internet is actually a global collection of
computers linked to exchange information, of which the World Wide Web is a
part. The distinction lies in that Web pages are characteristically linked through
hyperlinks and most of the information found on the Web is formatted in HTML.
The Internet evolved from ARPANET, which was originally a communica-
tions tool of the US Department of Defense. The World Wide Web was officially
established by Tim Berners-Lee in 1989 at CERN, a research institute in Swit-
zerland.
worm a program that enters a computer and replicates itself, often causing damage
to the system. see virus.
WORM (Write Once Read Many) an optical disk that allows a user to copy data to
it one time only, thus making it permanent. WORM disks can only be read by
the type of driver that created them.
write to copy data from main memory to one of many storage media such as a
floppy disk.
write-protect to ensure that a disk cannot be modified and the contents cannot be
over-written by a computer. A user can protect a disk by using a write-protect
utility found in many operating systems.
WWW stands for World Wide Web. see World Wide Web.
163 WYSISYG
WYSIWYG (What You See Is What You Get) pronounced wizzy wig, refers to a
program that displays data exactly as it will appear when published as a Web
page or printed. For example, Web pages are often created using HTML, a
code that appears as gibberish to the untrained eye. Of course, the HTML ap-
pears as a readable document when actually posted on the Web. To overcome
the need to learn HTML, there are many Web design applications that allow a
user to create pages in WYSIWYG, bypassing the process of learning the code.
XYZ
Xenix a version of the UNIX operating system developed by Microsoft for use on
PCs.
Xerox a leader in the global document market, providing document solutions that
enhance business productivity. The company’s document processing activities
encompass developing, manufacturing, marketing, servicing and financing a
complete range of document processing products and solutions designed to
make organizations around the world more productive. In the 1970s Xerox
developed devices such as the mouse and graphical user interface technology
that was later adopted by Apple for use in early home computers.
Xmodem a protocol for transferring blocks of data together from one computer to
another developed in the 1970s by Ward Christensen. The advantage to Xmodem
technology is in its ability to detect errors and to ensure that data isn’t lost
during transfer.
Yahoo a global Internet communications, commerce and media company that of-
fers a comprehensive branded network of services to more than 120 million
users each month worldwide. As the first online navigational guide to the World
Wide Web, Yahoo is a major guide in terms of traffic, advertising, household
and business user reach, and is one of the most recognized brands associated
with the Internet.
Yellow book the book that explained the standards set forth by Phillips/Sony for
CD-ROM recording. see red book.
161 zoom
zero wait state a state in which both microprocessor and memory run at maximum
speeds without waiting for memory.
ZIP a popular format for compressed data using .ZIP as the file extension.
Zip drive a dense type of floppy disk with the capacity to store either 100MB or
250MB of data, developed by Iomega Corporation. Zip disks are useful for
backing up large amounts of data.
zoom also called maximize, to enlarge a window on a display monitor. see maximize.
The User Friendly Guide to Internet & Computer Terms 166
167
HOW TO SHOP
FOR A COMPUTER
Gigabyte, megahertz, hard drive, modem, resolution, microprocessor. If
these words seem like digital soup, fear not. In no time flat, you’ll be
ready to get a great computer, with minimal stress and without breaking
the bank.
Whatever you end up using you computer for, you’ll need to evaluate
its capabilities in much the same way. So let’s get started. The first consider-
ation is the computer’s brain.
The Microprocessor
When you hear someone speak of the processor or the chip, it’s the
microprocessor they’re talking about. In case you hadn’t noticed, lots of PCs
have little decals on them that say “Intel Inside.” That’s because Intel is the
leading manufacturer of microprocessors and have been supplying many PCs
with chips for years. A couple of other companies that make them are Ad-
vanced Micro Devices and Motorola. Maybe you’ve heard of the Pentium
chip. Again, this is Intel’s premier processing chip. First there was simply the
Pentium, then the Pentium Pro, and then the Pentium II and Pentium III.
Each new version came equipped with more power and features.
The microprocessor determines how fast a computer can compute,
that is, the speed with which it can accomplish the hundreds of millions of little
calculations it takes to produce useful results for us. In technical language this
is called the clock speed, and refers to the number of instructions per second
the processor can execute. The clock speed is measured in megahertz (MHz).
The important thing to remember when shopping for a computer is, the higher
the MHz rating, the faster the computer, and the more expensive it becomes.
In the old days, (about six months ago when it comes to computers) a
fast computer had a processor rated at between 450 and 600 MHz, and de-
pending on other very modest features, would run anywhere from $600 to
$800. Today, such a machine can be purchased for about $500. In fact, if you
simply want a computer for word processing, games, and surfing the Net, it’s
pretty easy to find a respectable system in this price neighborhood. But we’re
getting ahead of ourselves again.
Processor speeds have broken new ground recently and are begin-
ning to be measured in GHz or gigahertz, with the recent introduction (though
limited and expensive) by both AMD and Intel of 1000 MHz processors.
Wow! a 1GHz processor. G stands for giga, the metric prefix for one billion.
What all this means to the end-user is declining costs for better tech-
nology. There will always be people who need to be on the cutting edge of all
varieties of technology, from stereo, to video, to communications and comput-
ers. However, if you are buying a computer for simple tasks, and want to
169 How to Shop for a Computer
keep the price down, a processor speed of between 450 and 600 MHz. should
be plenty. There are other considerations affecting the price of the processor.
The main one is memory.
Microprocessors contain their own “working memory” called a cache,
or more specifically the L2 (level two) cache. What this does is temporarily
store data called up from the main memory while the processor is functioning.
When looking at the individual components that will make up your computer,
you will see ratings for the cache capacity mentioned. It’s common to see
512K, which is plenty of memory for this function. One last word on proces-
sors. As you read through the list of computer features in any catalog or
computer retail store, the processor is usually the first item mentioned. It is
often referred to by manufacturer, model, and then speed.
Memory
The next consideration is memory, more specifically, main memory or
system memory. A computer’s ability to manage multiple functions depends
both on the processor and memory. When opening a program or file, data
must be copied from a storage medium such as a hard disk, CD-ROM, or
floppy disk to the main memory. Therefore, having enough memory to handle
several open applications becomes very important. For example, if a com-
puter has 32 MB of memory, that means it has approximately 32 million bytes
of memory available for programs to use.
The main memory used in computers is called RAM (Random-Ac-
cess Memory) because the computer can call it up for use randomly, that
means, any location in the memory can be used without regard to a specific
sequence or order. There are several types of RAM, three of which we will
look at in this section. The first is DRAM (Dynamic RAM). While operating,
DRAM needs to be refreshed with an electrical charge thousands of times
per second. Next is SRAM (Static RAM). SRAM does not need to be re-
freshed, thus making it faster and more expensive. Because of its high cost,
SRAM is usually used in memory caches and not as the computer’s main
memory. The third and most common memory is SDRAM (Synchronous
DRAM). This type of memory works by synchronizing itself with the micro-
processor, achieving very fast speeds.
Like everything else concerning computers, memory is constantly
improving. These days, off-the-shelf computers often come equipped with 32
to 64 MB of SDRAM. Again, we are faced with determining what we will be
The User Friendly Guide to Internet & Computer Terms 170
using the computer for. It has been my experience that as an individual be-
comes more proficient with a computer, her requirements for better and faster
equipment seem to grow. Since memory is relatively inexpensive, it makes
sense to go with at least 64 MB, or even 128 MB of SDRAM, especially if the
computer is going to be used to create elegant graphics or play elaborate
video games (Is there any other kind?). Also keep in mind that in most com-
puters, memory can up upgraded, meaning more can easily be added.
Hard Drive
Hard disk is a more accurate description for the computer’s main
storage medium. A hard disk is simply a magnetic platter where computer
data is stored. When we refer to data or information, we mean all of the
software, including the operating system, word processing programs, games,
and Web browser - the program that allows you to surf the World Wide Web.
In addition to the software you choose to install and run on your computer, the
hard drive will store almost all of the work you produce. When you save your
work, it is stored to the hard disk unless you designate another destination.
These days, almost without exception, hard disk storage capacity is
measured in Gigabytes (GB). The data kept in a computer, whether in the
form of commercial software, or something we create with it, is measured in
bytes. To make things easier, computer people have divided up the designa-
tions of the way we store data. We have kilobytes (K or Kb), approximately
1000 bytes, megabytes (M or MB), about 1,000,000 bytes, and gigabytes, (G
or GB) equal to about 1000 megabytes. These prefixes continue into the tril-
lions and beyond, but we’ll stick with these three for our discussion. A GB is
1000 megabytes. That’s a lot of information. But many of us have grown
accustomed to the idea that more is better, and when it comes to hard disk
space, more is better.
Have you noticed that each time we evaluate an individual computer
component we always come back to the same question: what will you be
using the computer for? Same thing here. Off-the-shelf computers are com-
ing equipped with anywhere from 4GB hard disks to 20GBs and sometimes
more than that. Although I do subscribe to the “more is better” theory, be-
tween 10 to 20GB should be more than the average user could ever need in a
lifetime, unless he plans to install tons of software and produce and store
thousands of graphics, video, and music files.
171 How to Shop for a Computer
The last item here is the floppy disk drive. The floppy disk is actually
a rigid storage disk that measures 3 1/2 inches. The term floppy is a holdover
from the days when some floppies (the 5 1/4 inch variety) were flexible. We
really have few options with the floppy drive as they simply come as standard
equipment on all modern computers.
Display Monitor
Computer display monitors vary greatly. They come in display sizes
ranging from 14 inches to 37 inches. There are several items to consider
when shopping for a monitor. The first is resolution. Resolution refers to the
clarity of images displayed and it depends on pixels. Pixels are the individual
points of color that make up the image on a display screen. The more tightly
packed the pixels, the better the resolution. This is sometimes referred to as
dots per inch or dpi.
One doesn’t ask a salesperson how tightly packed the pixels are on a
particular monitor though. One asks about resolution. A standard reference to
resolution is for a manufacturer to state the number of pixels present across
the top of the screen and the number along the side. The more pixels, the
better the resolution. It’s common for off-the-shelf monitors to display 1600 x
1200. If you were to multiply these two numbers, you’d find there were a total
of 1,920,000 pixels on the screen at any given time. That’s good resolution.
Another consideration is the refresh rate of the monitor. What this
means is, how many times per second is the screen refreshed or renewed.
This is measured in hertz (Hz). Look for at least 60 Hz or the screen could
flicker. We might also consider dot pitch. That’s the amount of white space
between each pixel. We’re looking for a small number here.
Many computers are sold in packages that include a monitor. It has
been fairly common to see computers sold with 15-inch monitors. In my opin-
ion, that isn’t a large enough picture. I look at it this way. Virtually everything
we do with a computer is first shown to us on a monitor. Photographs on the
Internet, word processing documents, spreadsheets, and almost everything
else displayed on a 15-inch screen is compromised by some measure using a
small display screen. Yes, you can see the entire image by using a scroll bar,
but you don’t get to see the whole image all at one time.
Computer manufacturers and retailers are aware of this and have
begun to respond. Many computers are now coming with 17-inch monitors, a
great improvement. We’ve seen the price of display monitors come down a
lot in the past couple of years. A decent 17-inch monitor can be had for
173 How to Shop for a Computer
between $150 and $200. And a smart shopper can get a 19-inch unit for under
$250.
Again, what will you be doing with the computer? If you are going
into business as a graphic artist or Web designer, you’ll probably want higher
resolution than you’d find in an off-the-shelf monitor. There are flat panel
monitors with display screens as thin as one inch. These save a lot of space
but are pricey. Some of the larger display flat panel monitors are selling for up
to $4000. There’s always a premium to pay for new technology.
For most of us, a medium to higher resolution 17 to 19-inch monitor
should be just fine. Some retailers offering a 15-inch screen in a package deal
will allow an upgrade for a few dollars more. Again, to me the monitor is very
important, so I’d go with the upgrade. Remember to always ask.
Printer
Of all the peripheral hardware devices associated with computers,
the printer has probably come down more in price than any other. At the same
time, the resolution and document quality they produce has only improved.
You can buy a decent color inkjet printer these days for under a hundred
dollars. I remember paying $350 for a comparable machine only a few years
ago. But like the Polaroid camera and safety razor, there is a downside. You’ll
need to maintain a constant supply of ink cartridges ready to keep the ma-
chine running. That shouldn’t be a problem though. The average black ink
cartridge should produce about 1000 printed text documents.
Like a monitor, a printer is rated according to the resolution of the
documents it produces. Additionally, the speed of a printer is important. We’re
going to take a look at inkjet printers and laser printers in this section and
weigh the differences between the two.
Laser printers use a laser beam that projects images onto a drum.
During this process, the laser light alters the electrical charge of the drum. At
the same time, the drum is rolling through a reservoir of toner, which tempo-
rarily adheres to the charged portion of the drum. The final step in the process
is for the drum to roll over paper. Using heat, the toner is transferred to the
paper, producing the image.
The technology employed by the laser printer is relatively complex.
Perhaps complex isn’t the right word. Expensive is a better word. Earlier I
said printer costs have come down more than any other computer accesso-
ries. That’s true. It’s true for laser printers as well. However, they are still
pricey.
The User Friendly Guide to Internet & Computer Terms 174
Laser printers are rated using several standards. First, many contain
their own microprocessor. This tells the printer how to best organize its work.
Microprocessors in laser printers range from around 70 MHz to 200 MHz. As
with computers, the faster the processor, the faster the printer runs, and the
higher the cost.
Printers have their own memory as well. The reason for the memory
is, when you click the print button, the entire job, whether it’s a single page or
a hundred, is stored in the printer’s memory. The pages are then printed in the
order they were created. When a printer is able to store printing jobs, it frees
up the memory resources of the computer. When talking about laser printers
there is really no “off-the-shelf” standard. Laser printers can be very task
specific, so their components will vary greatly. The RAM included in such a
printer could be as much as 200 MB, more than most computers. Lower end
models might have as little as 2 MB of RAM. The more memory a printer
has, the faster it can run and the larger jobs it can store.
Another consideration when evaluating a printer is the clarity of the
documents it produces. Again, we’re talking about the resolution. Much like a
display monitor, this is determined by the number of dots per inch (dpi) it
prints. The more dots per inch it prints, the better the clarity. Lower end laser
printers are often rated at around 600 dpi. More expensive units can go as
high as 1200 dpi and more. By the way, when I speak of lower end laser
printers, I’m referring to a price range of $300 to $600. Higher end models
can range from $2000 to $6000.
The last item we’ll look at here is the ppm or pages per minute a
printer can put out. All printers will product text documents faster than graph-
ics documents or photographs. And they will produce black ink documents
faster than color. When looking at the features of a printer, the manufacturer
will quote the ppm for black ink text documents. Lower end laser printers
average around 8 ppm while higher priced machines can go as high as 18 ppm
or more.
Many printers come with the option of connecting to a network. A
network card (plug-in circuit board) is required and adds cost to the machine.
Additional memory can also improve resolution and speed in many laser print-
ers. As with computers, additional memory and network cards may be added
to many printers at any time.
Most inkjet (and laser) printers produce letter quality documents. This
is a standard where a document is compared to one produced by a high qual-
ity typewriter. For my money, I’ll take the printed document over the typed
document every time, but that’s the way the standard has been set.
175 How to Shop for a Computer
Modem
The modem is the device that allows the transfer of digital informa-
tion between two computers over a network. In other words, the modem is
what allows you to connect to the Internet. The standard modem used in the
majority of computers today is the 56K V.90. 56K refers to the speed of the
data transfer measured in bits per second, so 56K is equal to 56 thousand
(K=1000) bps. V.90 refers to a standard that makes use of digital connec-
tions. In many instances modems connect computers over analog telephone
lines. However, there are more and more digital lines becoming available all
the time. The V.90 standard allows for faster connections speeds when a
digital line is available.
We’ve looked at the major components of a computer system. There
are more. You might want to add a scanner, a digital camera, an enhanced
sound, TV, or video card (a card is simply a small circuit board that adds or
enhances features like video or audio). A TV card will allow you to watch
television on your computer. Some will let you devote a small portion of your
computer screen to television while you work on other things. The bells and
whistles available for computers are staggering and could be the topic for an
entire book. Most of these items go beyond the scope of our discussion.
The User Friendly Guide to Internet & Computer Terms 176
Software
Think of software as nothing more than an exhaustive list of instruc-
tions for your computer to carry out. Software is what allows us to use com-
puters for useful work. We’ll start with the operating system. Until now, ev-
erything we’ve discussed has been hardware and would apply to both PCs
and the Macintosh. When it comes to software, we need to become a bit
more specific. Since approximately 90 percent of home computers are PCs,
we’ll be talking primarily to PC users. The good new is, much of the software
formerly available only to PC users, now has Mac versions available.
The most common operating system for the personal computer is
Windows. Regardless of how you feel about Microsoft or Bill Gates, the fact
remains, if you’re buying a new PC off the shelf, it’s going to come with some
version of Windows, probably Windows 98. Why not Windows 2000? Win-
dows 2000 is geared more towards professional and business use. Windows
98 is still a perfectly good, robust, operating system with a wide range of
functions.
If you are buying a computer to explore the Internet, you’ll probably
enjoy Internet Explorer. This is Microsoft’s Web browser. A Web browser is
a software program that allows us to look at online documents and Web pages.
Netscape Navigator is another popular browser that works much the same as
Internet Explorer. It seems that people often stay loyal to the first browser
they used. The nice thing with Windows 98 is that Netscape Navigator comes
with it, so a user can choose. Included with Windows 98, is an email program
called Outlook Express. This should take care of all of your email needs
unless you’re using an online service provider like CompuServe or AOL.
They have their own way for you to access email that’s just as effective.
In addition to letting you run a wide variety of Windows compatible
software, Windows 98 includes many free programs that you can use. There
are a few games such as the card game Solitaire, Minesweeper, where you
eliminate tiles on a grid one by one, trying to avoid hidden mines, and FreeCell,
a card game similar to Solitaire, with 32,000 variations. There is a paint pro-
gram that lets you draw and modify your pictures in color. Windows 98 in-
cludes a simple word processing program called Word Pad, a program you
can use to automatically dial your phone, an imaging program that lets you
communicate with a scanner, a calculator, and several diagnostic utilities for
keeping you computer in good shape.
What about the programs that will do the things you bought you com-
puter for in the first place? There are word processing programs such as
177 How to Shop for a Computer
manufacturers will want you to pack your machine up in the original container
and ship it at your expense to their service center before they’ll take a look at
it. That could get expensive.
Most computer retailers offer an extended warranty in the $50 to
$100 range for the first year. Like the computer you’re buying, you can also
upgrade the warranty. You can buy from one to three years and sometimes
have the option of having a technician come to your house to diagnose and
repair problems. Such an option could be mighty useful. Although, for the
most part, computers are sturdy and dependable, they can also be fragile and
temperamental at times. And like all other manufacturers, the computer in-
dustry produces its fair share of lemons. Purchasing an extended warranty is
often a wise move, especially if the manufacturer’s warranty requires you to
ship the machine for repairs.
The last item we’ll address is free computers and free Internet ser-
vice. They usually go hand-in-hand. The way such deals are structured is,
“buy this computer and get three years of Internet access free.” Or, pay up
front for three years of Internet access and get the computer for free. The
length of service varies from retailer to retailer, but most offers are similar to
the ones I’ve described here or variations on them. There are a couple of
considerations with these arrangements. First, break down the time you’ll be
committed to the ISP (you will be committed by a contract). Most such offers
value their Internet service at inflated prices. It isn’t uncommon to see them
charging $40 or more per month. The national average is around $20 per
month for an ISP, and there are an ever-increasing number of them offering
this service for free lately.
Multiply the monthly rate by the number of months you’re commit-
ment will last, and you have the true cost of the computer. By the way, deals
such as these usually don’t offer the latest in computer features. Take $40 per
month and multiply it by a 36-month commitment and you pay $1,440 for your
computer. I’d be willing to bet a smart shopper could buy a comparable, or
even better computer than most offered in deals like this for about 60 percent
of that price. Occasionally a decent system comes along marketed this way,
but it will benefit the shopper to always do the math.
As a computer enthusiast for close to 20 years, I’ve watched the
industry grow and change. Today’s cutting edge technology is tomorrow’s
bargain basement special. That just happens to be a fact of life. Does that
mean you should put off buying a computer? No. If you don’t enter the game
at some point, you’ll be missing out on a lot of fun.
As you venture out into the computer marketplace, take some time to
become familiar with the various components that come with computers. Take
179 How to Shop for a Computer
this book with you. There are dozens of computer publications available free
in electronics and music stores. There are magazines and books. Pick up a
few and compare components and prices. Talk to sales people. Ask lots of
questions. And when you’re ready, jump in with both feet, you’ll like it.
180
THE HISTORY
OF THE INTERNET
We often take it for granted without ever wondering how it came to be.
The Internet as we know it, has been more than 30 years in the making
and has certainly experienced its share of milestones and growing
pains.
Ask just about anyone who invented the light bulb or the telephone
and chances are, they can tell you. But ask even the most scholarly individual
who invented the Internet and you’re sure to be met with a puzzled look. In
1999 Al Gore was quoted as saying he “took the initiative in creating the
Internet.” It’s no secret that sometimes a politician’s mouth runs faster than
his brain. In reality, it’s likely that what Gore meant was, during his time in
Congress and the Senate he supported the development of the Information
Highway, and that would be accurate. So who invented this wonderful com-
munications medium called the Internet?
The seeds that were to blossom into the Internet were scattered in
the late 1950s during what was known as the Cold War. Not to be outdone by
the USSR’s launch of Sputnik, the US military was looking for a way to keep
the lines of communication open for both government and military officials in
the event of an actual attack, act of sabotage, or other catastrophic event.
By 1964, Paul Baran of the Rand Corporation came up with the idea
for a government-operated network of computers. The unique aspect of his
brainchild was that there would be no central controlling node in the network
because such a master unit was likely to be a target should the country come
under attack. Consequently, each computer in the network would function the
same as all the others.
It was further proposed that data transmitted over this network be
allocated into packets, each carrying the digital address of the sender and the
intended recipient. The network would be set up like a giant grid or lattice.
That way, if a hole was blown out of any particular portion of the grid, the
packets would be able to make their way around the damaged section, the
181 The History of the Internet
exact route being unimportant. Fundamentally, this is how the Internet oper-
ates today. Data transmissions usually follow the path of least resistance.
The government kicked this idea around for a few years and decided
to give it a try. In the fall of 1969, under the direction of the Advanced Re-
search Projects Agency (ARPA), the first node was installed at UCLA. By
December of 1969, three additional nodes were placed relatively close, one at
SRI International, a non-profit corporation in Stanford, California, one at the
University of California Santa Barbara, and the third at the University of
Utah. This first computer network was connected with dedicated general-
purpose telephone wire. Data transmission speed was 50 Kbs. The tiny net-
work was christened ARPANET after it’s sponsor.
By 1972 there were 37 nodes in place. Unlike today, computer ac-
cess was at a great premium in the late 1960s and early 1970s, so initially the
network was used by researchers to share valuable computer time. The pro-
tocol for transferring data around ARPANET in the early days was known as
Network Control Protocol (NTP).
Picking Up Speed
In an effort to increase data speed transmission, the National Science
Foundation, contracted with MCI in 1984 to upgrade CNET, a backbone inde-
pendent of ARPANET. MCI came up with the T-1 line, a type of cable that
183 The History of the Internet
allows for the transmission of data at speeds of 1.5 Mbps. Additionally, IBM
provided much of the hardware that routed traffic around the network. The
Internet’s backbone was growing. The project was scheduled for completion
in 1988. With so many new players joining the expanding network, a method
for identifying entities online was developed. Domain names were assigned
suffixes such as gov, edu, org, com, and net.
No sooner than the T-1 line project was completed in 1988, were
plans underway to upgrade the system with the T-3 line, which could accom-
modate a 45 MBPS connection. In 1990 the Department of Defense dis-
solved ARPANET and replaced it with NSFNET, the backbone jointly devel-
oped by ARPANET and the National Science Foundation.
Also, in the early 1990s Tim Berners-Lee, working with a European
consortium called CERN, introduced the hypertext system to the Net. Soft-
ware developed by Berners-Lee allowed users of the Internet to view a wide
variety of documents created by different software applications. By combin-
ing the Internet with hypertext he created hypertext transfer protocol (HTTP),
and hypertext markup language (HTML), as well as the first Web browser
called World Wide Web. This was initially done because Berners-Lee himself
had so much difficulty accessing documents online. He made his programs
available on the Internet. People began using the protocol and developing
browsers of their own. The World Wide Web had been born. Tim Berners-
Lee is the founder of the World Wide Web Consortium, an organization that
works to provide direction and unity to the Web.
create state-of-the-art Websites. And for about $100 anyone can buy a soft-
ware program that allows the user to download the site to disk, change the
significant individual company information, remove any obvious trademarks,
and publish the site as their own.
The question in my mind is this, “is this okay?” Technically speaking,
there aren’t any laws keeping people from doing this, yet. But aside from the
use of unabashed creative license when it comes to Website design, there are
more serious issues at hand.
At present, there is an international dispute simmering over the free
distribution of copyrighted music and video over the Web. And it presents an
interesting dilemma. In the spring of 2000, a company called Napster went
into business. One of the co-founders developed a software program that
allows the fast and easy transfer of MP3 music files over the Internet. At first
glance one might think this was another milestone in the ever-growing world
of technology. And that would be true. It’s the application of the software that
has the music and movie industries in such a tizzy.
What Napster has done is actually quite clever. Using the Internet,
they’ve formed an association of people who wish to both borrow and lend
music to other people in the association. It works like this. When an individual
signs up for membership, he provides Napster with a list of music he is willing
to allow others in the club to download, using the software developed by the
company. In exchange for this, he has access to all of the music offered by
the other members. Each member downloads the software from the Napster
Website, which includes a directory of available tunes and an online chat
forum. This way, members can find out who has the music files they are
looking for, and who is currently online making them available. It’s like an
international music library with an unlimited supply of inventory.
What this does is allow people to download entire music CDs and
collections and make copies to keep. The music industry and many recording
artists feel this is outright piracy. The company contends that the arrangement
is simply a big music lending co-operative. One might easily get the impres-
sion that once an individual has paid for a legitimate copy of a CD, that it is his
to do with as he pleases, including lending it to another. I think the question
comes down to this, is he really lending it? The argument can be made that he
is, and be compared to the arrangement book borrowers have with libraries,
but very few people have ever borrowed a library book, and made a copy
before returning it. To do so is against the law.
It seems both sides have valid points. Is the digital transfer of music a
violation of the law? We know that to sell the music file would be a violation.
But no one is selling anything. With every new wave of recording technology
187 Who Owns It?
that has come along, from early tape recorders to audio and videocassettes,
the holders of the copyrighted materials felt their livelihood threatened. In
reality however, piracy was discouraged because of the difficulty in mass
duplicating audio and videocassettes. But the Web changes everything. Mass
duplication of music is occurring, even if it happens one recording at a time
over the Net. And the bottom line is, the people who created the music are not
being paid for their work.
A Federal judge has ordered Napster to stop the facilitation of the
music downloads. The company was granted a last minute stay of the order.
Everyone concerned awaits the final outcome. It almost goes without saying
that this issue will need to be resolved in the courts. Though digital duplication
hasn’t presented a threat to the book publishing industry yet, at least on a
large scale, it’s possible we’ll see similar conflicts arise here as well. And this
all comes back to the point I made in opening. When people give cause for
governments to regulate or restrict something, politicians on both sides of the
aisle are all too happy to oblige. It seems only fair that both sides of the issue
have their day in court. That’s what this country is all about. I think we’ll all be
able to live with whatever decision the courts hand down. There are laws that
address copyright infringement now, and if it’s decided that’s what is happen-
ing, let it be so. Politicians always seem to want to create more laws where
existing ones would work well if only enforced. In my opinion, that would be
a shame. It would be a sad day to see more restrictions imposed on the last
frontier of freedom.
The User Friendly Guide to Internet & Computer Terms 188
189
THE TRUTH
ABOUT ONLINE TRAVEL
Does booking travel online automatically give you the best ticket price
for your money? Understanding how tickets are written can be an eye-
opening experience.
Among the early successful business models the Internet has spawned,
we find the travel industry. Despite the popularity and convenience of booking
travel online these days, many travel agents are clinging to their very survival
by precarious threads. The industry is presently undergoing significant changes
for a variety of reasons, the Internet among them. Community based travel
agencies everywhere are losing business to the Goliaths of the industry that
can offer quick and easy Internet service. And if the dramatic increase in
online bookings by travelers weren’t enough, scores of mom and pop agen-
cies have felt the pressure of commission reductions by all of the major air-
lines over the past few years.
Industry Shakeout
Industry analysts predict a major consolidation of all travel agencies
over the next decade, with only the strong surviving. The ability for agencies
to accommodate customers online will play a major roll in who survives and
who gets squeezed out. Is all of this good for the consumer? On the surface,
it seems that it might be, but, as with any change in the way an entire industry
conduct business, a closer look needs to be taken.
Many people assume that when they go online to an Internet travel
agent and enter a destination, travel dates, etc., the agent’s computer auto-
matically returns the lowest fare. It’s got to be, right? It says, click here for
the lowest fare. This assumption can be costly. In fact, five of the exact same
itinerary queries submitted to the top five online booking companies are very
The User Friendly Guide to Internet & Computer Terms 190
likely to turn up five different prices. How can this be so? There are several
reasons.
Regardless of how an individual makes travel arrangements, whether
online or by calling an agency on the phone, the booking entity is usually a
retailer of airplane seats, cruises, hotel rooms and auto rentals. This isn’t
anything new. How and where the agency gets its product will determine the
end cost to the consumer. And there are an enormous number of sources for
product. The price a customer pays for a ticket has a lot to do with how an
agency is set up, what wholesalers or consolidators they use, if any, the profit
margin they’re after, and how they choose to treat their customers. For a
better understanding of how travel services are priced, lets take a look at
some of the resources retail travel agents have available to accommodate
their customers. We’re talking about live agents you might call on the phone,
as well as automated online booking Websites.
Since most people use travel agents to buy airline tickets, we’ll keep
out discussion focused on the airlines, but the following principles also apply to
hotel and auto rental bookings as well. The question in this business boils
down to this: why is there such a difference in the price of an airline ticket?
The answer is simple. It depends where the ticket comes from.
Wholesalers
In the travel business there are three major wholesalers that supply
products to the agencies. Each of these wholesalers have contracts with the
airlines, and each of them maintain huge databases that track available inven-
tory such as flight destinations, times, dates, etc. Additionally, they keep track
of data on the availability of car rentals and hotels. The first place a differ-
ence in price might arise is with the wholesaler. The largest of the three might
be able to get a slightly better deal with an airline and pass that deal along to
a customer. This is not usually the case, as the big three have about the same
clout in negotiating with the carriers.
So, again, why the difference in price? To start, availability of what
you’re after and, and this is where it gets good, the willingness of an agent to
search out the best price. Please don’t misunderstand. It is possible for a
computer running a search on your ticket to come up with the best price. In
fact, it happens about 60 percent of the time. Those odds aren’t bad, but
they’re not great either. Despite the popularity and convenience of online
travel agencies, it seems we always get back to the human element when we
191 The Truth About Online Travel
seek the best price and service. When you check for a ticket price online, you
get one shot for the best deal. When you give your request to a live agent, that
person can explore a number of options the computer cannot or will not ex-
plore.
Only a well-trained agent can guarantee the best price when using
one of the wholesalers - an agent who is familiar with the quirks of the com-
puterized ticketing systems available through the wholesalers. Each one has a
similar system (similar in that they all operate using databases compiled from
the same raw information) yet each is different unto itself, and all of them are
loaded with their own particular quirks. The large wholesalers have recently
made efforts to modernize the various interfaces to their databases and make
them easier to use. Yet, industry professionals have told me that a good deal
of the bargain tracking ability of the system has been lost as a result of making
them more user-friendly. This is the price we all pay for convenience.
There are other reasons for price discrepancies. Some travel agents
don’t deal with the wholesalers at all. Having a relationship with one of the big
ones is costly. Among other things, an affiliation with a wholesaler means the
agency will have to use the wholesaler’s computer system, and post a surety
bond. Of course there are benefits to using them, but all agencies don’t see it
that way. Chances are, an agent without a relationship with a wholesaler is
dealing directly with the airline or with a consolidator. Lets look at these two
options.
offer a good deal to the consolidator today, in exchange for cash today. The
consolidator is able to pass the savings on to the customer.
You might ask, don’t the online booking Websites have access to
these cheaper seats. The answer is, sometimes. What it comes down to in the
travel business is this: There are lots of variables to consider with ticket prices,
and they are constantly changing. Even the best live travel agents have a
tough time keeping track of all these variables. It’s virtually impossible for an
automated service to do it, especially when all available booking options aren’t
accessible to them.
The last item I’ll address before offering a few constructive sugges-
tions is the auction-type ticket seller. We’ve all heard of this. It’s the name-
your-own-price deal. And, like online booking, can be great. There is, how-
ever, fine print. You’ve named your price, it was accepted, so you confirm the
ticket. Good. In addition to the price you got, there are also fees and taxes.
Not a problem, this stuff was spelled out to you when you signed up for the
service. But sometimes we forget exactly what it was we agreed to when we
signed up, and now they’re asking for $60 more than my bid. What gives?
Another thing, often tickets bought through the bidding process are not ex-
changeable - not even for the standard exchange fee. So if something hap-
pens and you can’t make the trip, you end up eating the cost of the ticket. For
many of us, no problem, for others, the right to cancel or exchange an airline
ticket (even for a fee) is important. Just something to consider when bidding
for a ticket.
on your destination after you’ve already booked, it can make sense to cancel
your original booking, pay the cancellation penalty, and reserve the cheaper
ticket.
Of course this only makes sense if the sale price beats the original
price plus the cancellation fee. Often it does. The point is you don’t even
have the option of trying this online. Once you’ve booked your ticket at an
automated Website, that’s it. Good live agents are also good at asking if your
departure and return dates are flexible. Sometimes a day’s difference either
way can save you a bundle. You can sometimes do this when booking online,
but not to the degree that a live travel agent can work the system for you.
Reading this, one might get the impression that I’m against online
travel agencies. First let me say this. I love the Web. I spend lots of time
investigating online commerce and studying the way information is stored and
delivered. But just because I have a passion for the medium, doesn’t mean I
blindly accept everything I hear about it. There are hundreds of Websites
offering the best prices on all types of products and services. Sometimes they
include travel, and sometimes not. The idea that you are going to get the best
price on anything by making the purchase online is a perceived notion. It’s the
result of carefully planned and very expensive marketing by the travel indus-
try. Marketing that, over time, is designed to benefit the industry leaders. But,
as with all things, smart individuals will always seek a better way.
194
THE INTERNET
SHOPPERS GUIDE
E-Z Shopper
The most obvious benefit of shopping online is the convenience of
having access to millions of retailers any time of the day or night from your
home or office. Of course, the drawback is not being able to examine a prod-
uct before buying. This too, was a concern in the early 1890s when R.W.
Sears published his first mail order catalog. It wasn’t long, however, before
people came to know Sears as a quality retailer, trusting the goods he offered.
195 The Internet Shoppers Guide
bookmark the page. Then, while still connected to the Net, launch
you browser again. Find another site with a similar product and click
the restore button in the upper right of your screen (this will shrink the
page). You can size the page by placing your mouse cursor at the
edge of the panel. When the little bi-directional arrow appears, click
and drag the window until it’s the size you want. Then go to book-
marks, and open the first site you found. You can position four or
more individual pages onscreen simultaneously this way by clicking
on the uppermost banner and dragging the window to the desired
location onscreen.
· Stores offering discounts and sales will notify you immediately by
email. You simply need to let them know you want to hear about such
offers.
· There are hundreds of Websites specializing in giving away money
saving coupons on both a local and national level.
As you can see, there are several benefits to shopping online. Why
don’t more people do it then? For the most part, they’re afraid of being cheated
in one of two ways. First, many think that if they pay for a purchase online
their credit card number will be stolen and used by a thief. The second fear is
that they won’t receive what they ordered. These are both valid concerns.
However, both can be overcome easily.
Credit is King
When shopping on the Web, the wisest way to pay for a purchase is
with a credit card. A buyer always has the option of disputing a charge when
using one. If you’ve written a check and there’s a problem, it could be impos-
sible to get your money back once the check has been cashed. Why not let
the credit card company take the risk? In fact, a company called Nextcard
Internet Visa compensates cardholders for losses due to online fraud.
To avoid problems with your credit card, be sure the merchant has
the ability to offer secure transactions. This means that when you enter your
account number, it is encrypted before being transmitted. Even the CIA would
have trouble using it without the appropriate decryption software. On the
bottom of the ordering page, you’ll find an icon of a key or a lock. This indi-
cates the merchant uses encryption security. If there is no evidence the site is
secure for credit card transactions, ask for proof that it is.
197 The Internet Shoppers Guide
If you’re afraid you won’t receive your order, restrict your purchases
to nationally known merchants you trust. Personally, I feel you limit your
shopping options too much this way. If unfamiliar with a merchant, you can
always ask them how long he’s been in business, and can he provide you with
a list of several satisfied customers. Merchants understand your fears and
want to help. Legitimate retailers will be more than happy to do whatever
they can to make a customer feel comfortable.
Web Watchdogs
There are a few other measures you can take to make your online
shopping experience safe. Look for merchants that display a seal. Because
the medium is so new, you might not recognize some of them. The Web As-
surance Bureau has been operating since 1995 and maintains a database of
customer complaints you can check along with the action the merchant took
to correct the complaint. There’s also the Public Eye, Web Trust, Gold Cer-
tified Merchants, and Platinum Certified Merchants. For dispute resolution
concerning an online transaction, you might check with iLevel.com.
For anyone thinking of making his or her first purchase online, it might
be wise to start small. Perhaps your first online purchase should be a book
rather than a Buick. It’s easy to get carried away. You’ll also want to ask
about shipping costs. And find out what the business does with your personal
information. Unless you don’t mind calls from telemarketers and tons of com-
mercial snail and email, you should make it a condition of the sale that the
merchant not sell it. There is usually a privacy policy posted somewhere on
the Website, read it before buying.
Find out about guarantees, warranties, and return policies. For ex-
ample, because many online hardware and computer retailers sell computers
at such low prices, they charge as much as a 20 percent restocking fee for
returns. You should know this before buying. Finally, keep good records. Con-
sider using a journal listing all of the vendors you’ve visited and requested
information from. And when you do buy something, save the order form to
disk and print out a copy for your records. Following these simple tips can
help you on your way to a happy and productive Internet shopping experi-
ence.
198
the buy and sell orders are placed. For many large brokerage houses the
Internet has become a blessing. It means they don’t have to keep as many
brokers on hand as they might without the medium. The marketing done by
many online brokers makes it seem like one simply has to open an online
account to become a successful investor. Can it really be that simple? Let’s
look at some of the so-called advantages of investing online.
Free Research
All of the online brokers offer free research. That sounds good. But
take a look at the Internet for a moment. If nothing else, the World Wide Web
has got to be the biggest interactive library or information depository the world
has ever known. When an online broker boasts “free research on over 10,000
companies” they aren’t offering anything that isn’t available all over the Net
already. Sure, there are exclusive services an investor can pay for to get
additional information, but this is not the stuff the online brokers are using to
attract customers. Many are offering the same information that most people
got access to when they signed up for Internet service.
How about the ability to execute a trade online quickly? Well, there’s
some merit here. But, as with everything else, this too, has its drawbacks. In
a fast moving market, orders to buy and sell stocks and options come in quickly.
In fact, when you sign up for a trading account with a broker either online or
one you deal with in person or on the phone, one of the first disclaimers the
firm will make, in writing, is, they are not responsible for orders not executed
due to high trading volume. So, we’re back to square one. I’ve talked to many
people who have actually had online trades confirmed, only to find out later in
the day the trade had not actually gone through. This does happen occasion-
ally with a live broker, but it is rare.
Customer Service
Another claim made by the online firms is great customer service.
This is almost laughable. The real life translation of this claim is, if all attempts
to make a trade online fail, you can place a trade with a live broker. The
problem here is, it’s rare to get the same person to help you twice, and they
are not at all service-oriented. In other words, there is no advice or invest-
ment coaching available with the majority of online brokers. That part of the
service was covered with the free online research you get.
perienced investors. I don’t feel that trading online is something a new inves-
tor should do until he understands exactly what he’s up against. If you’re a
new investor making more than six to eight trades a month, you probably need
a live broker, at least for a while. If you are depending solely on your Internet
firm to place timely buy and sell orders for you, it’s simply a matter of time
before a misunderstanding occurs.
As with most things in life, there are exceptions. Here they are. If
your trading volume is light, and you are buying stocks for the long term, it
might be worth it to trade online. The savings in commissions could be to your
benefit. Along those same lines, if you want to maintain a self directed IRA,
one where the majority of your investments will be kept for the long haul, then
perhaps an online account would be sufficient. For investors using the buy
and hold strategy, quibbling over an eighth of a point when buying or selling
can be silly. Momentum players abound in today’s market and a fraction of a
point can make a big difference when trading heavily. For the long-term in-
vestor, the money is made in growth not fractions.
Momentum Trading
My intentions in this section were to shed some light on some of the
enthusiastic claims being made by the online brokerage companies. As I said,
for some, they can be just fine. Many people would be better off with a live
broker who understands her client’s needs. Having said that, I want to briefly
discuss a phenomenon that has taken the market by storm and it is directly
related to the Internet.
If nothing else, the Web is a wonderful tool for communications. There
are hundreds of thousands of interactive Websites, bulletin boards, chat rooms,
and of course email. It so happens that much of the movement in any particu-
lar stock is derived from news. If it is rumored that a particular company will
beat earnings estimates, will launch a new product, hire or fire a CEO, or is
under consideration for a takeover, the news alone can cause the stock to
move dramatically. Both the upward and downward moves a stock makes
are called momentum. And an interesting thing has developed with the rise in
popularity of the Internet. People can often create momentum in stocks by
simply repeating news online.
There are email services that will mail anyone who wants it the “pick
of the day.” Usually the pick of the day is based on some newsworthy item
about to happen, such as an earnings announcement for example. As the list
The User Friendly Guide to Internet & Computer Terms 202
of email subscribers becomes larger, the pick of the day becomes more sub-
ject to price swings or momentum. The logic here is simple. The more sub-
scribers, the more people who’ll buy the stock based on the pick, thus driving
the price up. The pick of the day becomes a self fulfilling prophecy.
This type of activity has become very common online and has cre-
ated many fortunes. One first becomes familiar with an analyst and his record,
and buys the “pick” at the appropriate time. The rumor or prediction being
touted is almost secondary to the frenzy that can be created when the herd
gets behind a stock. Of course, there comes a time in every momentum play
that the herd changes direction. That’s the downside. Momentum works both
ways. It’s as though someone stands on the country’s highest mountaintop
with a super powerful megaphone and shouts, “We’re in.” The buying begins
and can become outrageously crazy. Then all of a sudden, the same person
shouts, “We’re out,” though not nearly as loudly as the “We’re in” announce-
ment. Remember playing Old Maid? Unfortunate investors sometimes get
stuck holding the bag.
Momentum traders were around long before the Internet became
popular, but getting the word out on a stock was much tougher in the past and
it took a lot longer for the momentum to build. Using the Web to move market
rumors around the country can have dramatic effects, sometimes immedi-
ately. Am I suggesting that anyone should go out and try to capitalize on this
type of thing? Certainly not after reading this little piece. Is there money in
this type of trading? Yes, lots. Can it be risky? Yes again. Might it be some-
where to focus your online energy? Only you can tell.
203
AVOIDING WEB
FRAUDS & SCAMS
The vast majority of online merchants deliver what they promise. Learn
what to look out for in the ones who don’t.
The Internet may not be the last frontier but it certainly is a new one.
And anything new is sure to attract not only the curious, but the devious as
well. The greatest fear people have when it comes to shopping online is that
their credit card number will fall into the wrong hands during data transmis-
sion due to faulty or non-existent security by the merchant.
Surprisingly, online shoppers are more concerned with their credit
card numbers falling into the wrong hands than they are about downright
deception by the merchant. That should not come as a great surprise as Ameri-
cans, for the most part, are a trusting people. But there are individuals in
cyberspace who see the Internet as a medium to make a quick buck without
delivering anything in return. Our focus in this section is to learn to recognize
such scamsters and avoid being among their victims.
Virtually every type of fraud perpetrated on the American public since
the first settlers set foot on the North American continent is alive and well in
the year 2001. The Internet is simply another medium that crooks will attempt
to use to run age-old schemes and their modern variations. Unfortunately, the
single factor that allows shady operators a foothold is often our own greed.
The old saying bears repeating here, if it seems too good to be true, it probably
is. Lets first take a look at where the scammers are concentrating their ef-
forts.
According to Internet Fraud Watch, the bad guys pulled in $3.2 mil-
lion in 1999 deceiving people online (actually a small percentage of total online
sales). The following is a breakdown of frauds perpetrated in 1999 listing the
product or service, the home state of the fraudulent company, the method of
payment used, and the age groups of the victims.
The User Friendly Guide to Internet & Computer Terms 204
Fraud Statistics
1. Online Auctions 87 % of the money stolen was due to people not
delivering a product or service to the winning bidder of an online auction
2. General Merchandise 7 %
3. Internet access services 2 %
4. Computer equipment and software 1.3 %
5. Work-at-home-scams .9 %
6. Advanced fee loans .2 %
7. Magazine subscriptions .2 %
8. Adult products and services .2 %
9. Travel .1 %
10. Pyramid/Multi level marketing .1 %
1. California.
2. Florida.
3. New York.
4. Texas.
5. Pennsylvania.
1. Money order.
2. Personal/business check.
3. Cashiers check.
1. 40 to 49.
2. 30 to 39.
3. 20 to 29.
4. 50 to 59.
5. 60 to 69.
205 Avoiding Web Frauds & Scams
Auctions
Online auctions can be a great place to pick up bargains, but obvi-
ously one needs to exercise caution when using them. The largest auction
Website is Ebay and they have several precautions buyers can take to reduce
the chance of fraud. First, they maintain profiles on both sellers and buyers.
Ebay allows you to look at a seller’s profile before making a buying decision.
The company uses a point system for buyers to rate sellers. +1 indicates a
positive experience. 0 indicates neutral and -1, a negative experience. Basi-
cally, this tells a prospective buyer if a seller is in good standing with Ebay.
They also provide a feedback section listing the number of people who’ve
done business with a seller, along with remarks from previous buyers about
quality of merchandise, promptness of delivery, and whether a buyer would
recommend the seller to others.
Every Ebay buyer automatically receives up to $200 in insurance
(minus a $25 deductible) against non-delivery of products, or merchandise
that is not up to the standard described by the seller. In addition to insurance,
they have an escrow service, where a seller can send her payment until she
determines whether she wants to keep an item. And finally, they have a dis-
pute resolution division, where buyers and sellers can work out issues that
may arise using mediators.
It would seem that the resources to avoid trouble are all in place, but
a determined crook can sometimes circumvent even the most stringent secu-
The User Friendly Guide to Internet & Computer Terms 206
General Merchandise
Here we’re talking about anything from housewares and apparel to
books and camping gear. Seven percent of the fraud reported in 1999 fell
under the category of general merchandise. When trying to minimize the risk
of making a purchase, think of the things you’d look for in a brick and mortar
merchant. First, how long have they been in business? Because the Web is a
relatively new medium, you might find the seller has only been operating a
few months. Is this a reason to avoid them? Not necessarily. Ask if they can
provide a list of at least three satisfied customers. A legitimate business should
be happy to oblige. Any hesitation here by the merchant should send up the
first red flag.
With a brick and mortar establishment you can inspect the physical
location and determine a lot about the type of operation the proprietor is run-
ning. Online, you need to judge the merchant solely by the Website. There are
two considerations here. First, if the site looks like it was designed by an
amateur, that could be a sign to shop elsewhere. Though not always cause for
concern, an unprofessional appearing Website could mean trouble. Secondly,
a Website that looks great could be just as dangerous. It isn’t hard or all that
expensive to create a great looking site. The point is, it’s difficult to judge an
online merchant solely by the appearance of his Website.
So let’s look a little closer. What type of payment does the business
accept? If they take credit cards you’ll want to be sure that your transaction
will be completely secure. By completely secure, we want all aspects of the
transaction including name, address, credit card number, and all other per-
sonal information to be encrypted so it would be useless to a thief if inter-
cepted during transmission.
Don’t simply accept the merchant’s word that transactions are se-
cure, check it out. How? Somewhere on the ordering page, there should be a
small key or lock icon or banner stating the name of the vender supplying the
encryption security. Click on this link and inquire about their security methods.
If there is no link to a security service, ask the merchant who he uses. By the
207 Avoiding Web Frauds & Scams
way, paying by credit card when shopping online is the best way to go be-
cause if there’s a problem with your purchase, you can always dispute the
transaction with the card issuer. The most common method of payment for
people who had problems buying online in 1999 was money orders and checks.
In addition to secure payment, you’ll also want to be clear on shipping
charges as well as the terms and conditions surrounding your purchase. Can
you return it? Under what conditions is it returnable? Is there a warranty?
After the company has received payment, how long will it take to arrive?
Does your purchase involve a service contract? Reputable online merchants
should be able to offer the same level of quality and service as retailers with
a physical location. One exception might be an online company specializing in
closeouts or refurbished goods. These are usually sold on an “as is” basis. If
you have trouble getting answers on any point that concerns you, it’s probably
a sign to keep shopping.
One way to avoid problems is to deal only with merchants you are
familiar with. I feel you’d be narrowing your shopping options considerably,
but if you only feel comfortable with names you recognize and trust there’s no
reason to shop elsewhere. Once again, when considering any purchase online,
step back, look at the big picture, and ask yourself, is this too good to be true?
If you feel it is, you’re probably right.
enough space to host 50 unlimited Websites for a flat rate of $200 per month.
The buyer of such a deal can then offer Web hosting on his own site at any
price he can get, say $39 per month. He acts as an agent for the larger
company. Often this is okay, but the reseller might not have the means to
provide technical support and service to customers. You might ask, what does
Web hosting have to do with ISPs?
Large ISPs may make the same type of arrangements as the Web
hosts. They sometimes sell blocks of service to independent companies who
resell individual service contracts. This is a common practice in a small resort
community near me. Vacationers visiting the community for a few weeks
wanting Internet access can sign up for service with a merchant in the com-
munity for $25 per month. The merchant is buying that access for $15 per
month. As long as everyone is happy there’s no problem.
The main area of concern with ISPs and Web hosts is paying a large
sum upfront for an extended service contract. You can often get a great
discount for doing so, but you’ve got to be certain the company will be around
to deliver the service. How can you be sure they’ll be there? The only way is
to check them out thoroughly and make a decision based on past perfor-
mance. Be especially careful when paying for anything upfront online, or
anywhere else for that matter. There are lots of reputable hosts and ISPs out
there. Ask a satisfied friend who they use. In fact, if you are willing to put up
with a relatively small banner ad on your screen, you can get Internet access
as well as hosting for free. Nothing to lose there.
you’re dealing with. Many companies, for a fee, promise to submit your loan
application to scores of lenders. They make no guarantees about approval.
Does this mean they aren’t running a legitimate service? Not at all. I’m sim-
ply saying what I’ve been saying all along. Know who you’re dealing with.
Find out what their success rate has been by talking to clients they have
helped in the past. Check with the Better Business Bureau and your State’s
Attorney General to see if there have been any complaints or legal actions
taken against them.
As for mortgages and home equity lines of credit, the only upfront fee
that is customary is the credit check and appraisal. And the mortgage market
is so competitive right now that most companies are either willing to waive
those fees, or add them to the loan amount, if and when the loan is approved.
It goes without saying that you should closely investigate any company offer-
ing mortgage loans. Read carefully the loan application and any loan docu-
ments. Verify all promises regarding interest rates, origination fees, pre-pay-
ment penalties and the term of the contract. This would probably be a good
place to bring in an accountant or attorney to help if you are unsure of the
many particulars.
Credit repair is another popular service offered online of late. We’ve
talked enough about checking out the company, so we’ll get to the nuts and
bolts. You should receive a summary of all the work the credit repair com-
pany is promising to do for you. Don’t be fooled by claims that the agency will
wipe out all of your debts and establish a new Social Security or Tax ID
Number for you. They can’t, not legally anyway. Don’t pay any upfront fees.
If you actually owe money to a merchant, you’re probably going to have to
pay it or declare bankruptcy.
What a credit repair company can do for you is write to credit report-
ing agencies asking them to remove erroneous data from your file. They can
also write to creditors asking them to help you set up a payment plan that is
more suitable to your budget. The creditors will want you to send them your
credit cards cut into little bitty pieces, before they’ll give it a try. These are
probably things you can do on your own, without incurring the cost of the
service. However, for some people, having the support of a credit repair agency
gives them the feeling they are not fighting the battle alone. Can such support
be worth the cost of the service? Absolutely. What I’m saying is, do your
homework in checking out a prospective agency.
211 Avoiding Web Frauds & Scams
Magazines
There are many legitimate magazine offers online. Some offer a two
or three month trial period for free. If you don’t cancel at the end of the trial
offer, you’ll be billed for an entire year. This is nothing new. Subscription
services have been doing it for years.
The real problem with online magazine subscriptions is people often
don’t realize that they are signing a contract to receive a magazine or group of
magazines for a long period of time. President Clinton recently signed legisla-
tion that makes entering into a contract online just as binding as one made
face to face. So the bottom line here is to understand the terms you’re agree-
ing to.
Can the company offer secure credit card transactions that are encrypted?
Paying by credit card leaves a shopper with the option to dispute the
charge.
Don’t pay for products or services upfront without satisfying all of the
previous points.
E-COMMERCE CLOSE-UP
While traveling from the San Diego airport to a hotel in La Jolla re-
cently, I couldn’t help but notice several ads and sign banners along the road
promoting Websites of various businesses. I imagined myself waking up after
being asleep for 10 years and finding all of these interesting “dot com” com-
mercials everywhere. What would a stranger who’s been out of touch think
of this? What could this be?
Obviously the Internet isn’t going away. Even marketing genius Bill
Gates had to do a double take a couple of years ago and re-evaluate his
opinion of the Internet. He decided it wasn’t just a fad as he’d previously
thought, and made a major effort for Microsoft to gear up to capitalize on the
many opportunities available there.
Was Gates late to the game? Hardly. As a medium that will serve
many functions, the Internet is still in its infancy. I’ve heard it said by would-
be entrepreneurs “all the good domain names are taken.” On that point, I’m a
little dubious. Currently, conventional wisdom says that unless you have a
.com domain, you’re likely to be considered a Johnny-come-lately or a newbie,
to use the vernacular of the times. Sure, a .com URL might be an indication
that a business has been around awhile, but the purist attitude that goes with
having an exclusive .com suffix to your domain name will soon seem silly.
Does anybody shun a free toll call because the number doesn’t begin with, 1-
800? Of course not.
Early Leaders
E-business is a new animal. Sure, many large Internet companies are
fighting tooth and nail to establish a presence that will be a lasting one, but
The User Friendly Guide to Internet & Computer Terms 214
what does that mean to the small time operator? Very little. To make a very
respectable living, even a fortune, doesn’t mean having to compete with the
big dot coms. In fact, smaller online businesses have advantages that the big
guys don’t. But even if it did mean competing, many of today’s Internet lead-
ers will probably be little more than a memory in the not-so-distant future.
Think back to the early days of Personal Computers. There were dozens of
companies offering their own versions of home computers.
Some of us can remember back to the early 1980s when computers
like the Sinclair 2X Spectrum or the British-made Dragon, or the Vetrex were
introduced. How about the Epson HX20, or The Corvus Concept? Some of
these computers promised to be the future. My first experience with a com-
puter was in 1982 when Sinclair teamed up with Timex and offered a mail
order computer for $100. It came with instructions for programming! I thought
it was pretty cool. I remember working my way through a couple of the
exercises in the manual and programming the thing to function as a clock. Of
course this was after connecting it to a TV set so I could view my work.
Wow!
My point here is, most of the early home computer pioneers didn’t
become industry leaders, and the same thing is likely to happen with early
Internet pioneers. Some will be swallowed up in mergers and takeovers and
others will simply fold. It’s likely that the true dominant players in the field
have not even gotten started yet. So, if you endeavor to start an online busi-
ness of some type, you just might have a chance, an excellent chance at that.
Consider these interesting points:
! Even though online shopping has been around for several years, people
are just now becoming comfortable with offering credit cards as pay-
ment online. Security has been the issue.
! Until recently, there have only been a few business models that have
been able to use the medium successfully. So unless your Website
offered travel, pornography, an auction forum, or consulting, your
chances for success were greatly diminished.
! The Internet is finally gaining mass acceptance. As I mentioned ear-
lier, even Bill Gates felt the World Wide Web was little more than a
fad just a few short years ago. Many Americans are now embracing
the medium. There are even 12 Step groups forming to help people
who have become addicted to Web surfing.
! The cost of Personal Computers has dropped dramatically in the last
few years. As the leading computer manufacturers battle for market
215 E-Commerce Close-Up
share, they are offering faster computers, with more features, for
less money - something that allows more people to get in on the ac-
tion.
! As of the spring of 2000, only 60 million American families had Internet
access. This represents less than 40 percent of the population of the
United States.
! 35 percent of the time spent online is concentrated visiting just 50 of
the Web’s best sites. 70 percent of the traffic goes to the same 4,500
Websites and 75 percent of online purchases are made at the top 10
sites.
Great Timing
All of these factors point to a world that will grow even smaller as Internet
technology improves. The day will certainly come when it will no longer be a
novelty to shop online. Is there time for a savvy entrepreneur to get in on the
Internet boom? The time has never been better. As the medium becomes
more accepted by mainstream America, the future can only get brighter. What
business model should one adopt? That’s anyone’s guess. But there are defi-
nitely some business models that make more sense than others.
Presently, a business that is part of the machine helping to build the me-
dium makes the most sense to me. Graphic designers who are able to adapt
their skills to Web design are in tremendous demand right now. And clever
copywriting is a talent that is much needed for Website owners who want to
grab the attention of a visitor and keep it.
Of course, there is the technical aspect of keeping the Internet alive such
as Web hosting, as well as providing connections to people simply wanting to
surf the Web as an Internet Service Provider (ISP). Perhaps the most valu-
able service that may be offered to those trying to establish an Internet pres-
ence is marketing and promotion. Presently, it is possible to make money on
the Internet simply by having a successful Website. By successful I mean a
site that receives a lot of visitors, because site traffic, as we will see, is every-
thing to e-commerce.
The User Friendly Guide to Internet & Computer Terms 216
freebie. Using special tracking software, the telephone company knows where
that new customer came from (the freebie Website), and if they remain a
customer, the site operator will receive a commission or finder’s fee. The
same arrangement is common with ISPs, online malls, network marketing
companies, Web developers, CD retailers, movies, magazines, again, the list
goes on. By far, this is the least profitable of the three profit centers because
commissions are small, but with enough traffic, could generate another $5,000
per month. Some people would be thrilled to generate $5000 per month with-
out any other income
Of course, everything depends on getting visitors to the site. And that
will depend on many factors, such as search engine placement, marketing,
advertising and word of mouth. Traffic is everything because the volume of
visitors viewing pages and requesting information is where the real profit is.
With this in mind, would it make sense to perhaps offer the nation’s top 10
selling music CDs to your customers online at cost? Any retailer worth his
salt should be able to buy product for 50 to 60 percent of its retail price. If a
top 10 CD retails for $14, that means you could buy it for about $8.50. If you
sold it for that and added $2.00 for shipping and handling, you’d be giving
customers a super bargain, and driving tons of traffic to your site. With the
profit generating methods we discussed previously, do you think you could
make money? It’s almost hard to fail, once you understand how e-commerce
really works.
Information Utility?
We’ve talked a little about generating income by servicing other busi-
nesses, but what about retail customers? There’s a great deal of opportunity
here too. Almost anything can be marketed online, but because the Internet is
well known as a massive information utility, why not market information?
People have made fortunes selling recipes, tips on playing video games, how-
to books and newsletters of all types, consulting, personal coaching, you name
it. Packaged and marketed properly, information commands big bucks. Could
you sell services you already offer? Flowers, travel, real estate, advertising,
home wine making, and computers are among the many things marketed
successfully online. To be noticed takes a little ingenuity. If you are uncertain
as to how to start, get some help. There are lots of individuals who understand
online marketing - they’ve made it their business. Remember, with a high
volume of traffic to your site, you can often sell your products or services at
219 E-Commerce Close-Up
break-even. You simply funnel the traffic into the profit areas we talked about
earlier.
Will online marketing always be so lucrative? It will for those who are
able to think outside the box - or can hire someone to do it for them. Many of
the profit generating opportunities will dry up only to be replaced by new
ones. Forrester Research has projected that Internet advertising will exceed
more than a trillion dollars by the year 2003. That’s only 2 short years away.
The Internet is still in its infancy. Increased sales and growth are only going to
continue. Marketing a product or service online is something an entire family
could do to generate extra income. Overhead is very little because ingenuity
is the real capital in this game.
We’ve all heard the naysayers. I don’t necessarily mean people who
are opposed to the Internet or even technology. I mean your garden-variety
negative person who would like us to believe that opportunity has simply dried
up in this country. I say baloney! This medium called the Internet represents a
once in a lifetime opportunity to make a difference, to offer something good
for society, while serving yourself at the same time. Are you the next dot com
millionaire?
The User Friendly Guide to Internet & Computer Terms 220
221
Netscape Navigator
Here are a few simple Easter eggs for you to get started. Some of these will
work on all versions of the browser, while others work only with earlier ver-
sions. In the address field of Netscape Navigator browser type:
about:mozilla about:cache
about:global history of images about:mailintro
about:copyright about:photo
about:license about:plugins
about:1994 about:authors
about:chouck about:document
about:francais about:global
about:hype about:image-check
about:javalogo about:Netscape People
about:jwz about:language
about:logo about:marca
about:memory_cache about:security?banner-mixed
about:pics about:security?banner-payment
about:rsalogo aboutsecurity?banner-insecure
The User Friendly Guide to Internet & Computer Terms 222
Dancing Fools?
The Screen Saver will display the names of various volcanoes as it runs.
Win98 Development Team (This takes some patience but is worth it)
If you didn’t get it the first time, try again. Everything must be done
exactly as outlined. I can’t understand why Microsoft hid such a cool
display as an Easter egg. Enjoy.
1. Open PhotoShop.
2. Hold down Crtl, Alt, and Shift.
3. Click Help and click About PhotoShop. See the kitty?
The User Friendly Guide to Internet & Computer Terms 224
1. Open FrontPage.
2. Hold down the Shift Key, click Help and About Microsoft FrontPage
Explorer.
3. With the Shift Key pressed, repeat step two to three times.
1. Open Money 2000 and create a current new Check account named
Microsoft.
2. Go to the “Change Account Details” section of the account
and type “Money Rocks!” without quotes in the Comment field.
3. Click Done.
4. Click the Accounts icon to return to the main accounts list page.
5. Click on Balance an account, and select your Microsoft account.
6. Crank up the volume.
1. Start Windows95.
2. During the boot process, you’ll see a
black screen with only a cursor blinking.
3. Before your wallpaper loads, press (without commas)
Ctrl, F6, the right shift key, Delete, and right click your mouse.
4. Say hello to Nugget, Bill Gates’ horse.
1. Open PowerPoint.
2. Click Help, and About PowerPoint.
3. Click on the PowerPoint logo (double click in the 2000 version).
1. Open a new Word document, Click Help and About Microsoft Word.
2. Press Ctrl, Alt, Shift.
227 Fun with Easter Eggs
1. Open Word.
2. Press Ctrl, Alt, and the plus sign (+).
3. If a dialog box pops up, close it.
4. To return to the normal cursor, click on File, and close the document.
Windows98...or is it?
Software programs aren’t the only place you’ll find Easter eggs. They’re
also in hardware devices, such as printers and scanners. You’ll find
them in video games. They can be found in movies and television shows.
And of course, there are plenty to be discovered on the World Wide Web.
Check out these Websites for some interesting hidden goodies.
Dancing Mouse
Haywire!
Virtual Perspectives
Double take
Evil Empire?
Digital Demon
Dogbomb Poetry
Wolfs, Camels
The Team
EMOTICONS:
PUT A SMILE IN THAT FILE!
Mustac he - Hand l eb ar
*^_^* Huge Dazzl i ng Gri n :-3 Ty p e
The User Friendly Guide to Internet & Computer Terms 234
-=#:-)
:-! Und ec i d ed Wi zard wi th Wand
/
(:-( Unhap p p y ,-} Wr y and Wi nki ng
ONLINE SHORTHAND:
COMMON EMAIL & CHAT ACRONYMS
Brevity is of the essence everywhere on the Web. These fun symbols should
help you to keep it short and sweet.
A/S/L Age/Sex/Location
AFAIC As Far As I’m Concerned
AFAIK As Far As I Know
AFK Away From Keyboard
AISI As I See It
AKA Also Known As
AMBW All My Best Wishes
ANFAWFOWS And Now For A Word From Our Web Sponsor
ASAFP As Soon As “Friggin” Possible
ASAP As Soon As Possible
ATST At The Same Time
AYSOS Are You Stupid Or Something
B4 Before
BBIAB Be Back In A Bit
BBIAF Be Back In A Few
BBL Be Back Later
BBN Bye Bye Now
BCNU Be Seein’ You
BFD Big F***ing Deal
BFN Bye For Now
BHOF Bald Headed Old Fart
BIF Basic In Fact
BITD Back In The Day
BM Byte Me
BNF Big Name Fan
BOHICA Bend Over Here It Comes Again
237 Online Shorthand: Common Email & Chat Acronyms
2. Label Your Disks Label all of your backed-up floppy disks, tapes and
other stored information with the name of the file and the date last changed.
Writing the contents on the disk’s sleeve isn’t enough, as these are misplaced,
lost, or the wrong disk ends up in the wrong container. It saves lots of time, not
having to pop in a floppy or CD-ROM and open it to see what’s there.
3. Checking Disks When checking the contents of more than one floppy
disk, simply eject one, insert the next, and hit the special function key F5. The
file names of the contents of the disk will appear on your screen.
HOT TIP
4. Safe Keeping of Technical Manuals Depending on how many bells and
whistles you need to be happy in the Information age, you may opt for your
computer to be set up with a scanner, printer, a zip or jaz drive, and perhaps
even a digital camera. This way you can send pictures of the kids across the
state so Aunt Peggy can see how much they’ve grown. Whatever you decide
to add to the system, keep all of the manuals and software (called drivers)
that come with each of the devices in one place. It’s also wise to write down
the technical support telephone numbers for each device in a log and keep it
by the computer in case you need technical assistance. Nothing is more frus-
trating than having your system go down, and not having the resources handy
to get it back on track immediately.
long it’s been since the last time the program was run. Get in the habit of
tuning up your computer every three to four months – more often if you use it
a lot.
6. Check Special Key Functions The mouse has to be one of the most
useful computer tools ever invented, but there are times when it isn’t the most
convenient way to work. There are many special function keys available that
sometimes offer quicker access to commands than the mouse. Trouble is,
many of the keys perform different functions depending on the program run-
ning. An easy way to find out what keys work in the program you’re using, is
to click on File, Edit and Tools in the menu bar. Here a drop down menu will
show the special key commands for the most common functions. For ex-
ample, pressing Ctrl and P together sends a file to the printer, while pressing
Ctrl and A selects the entire file. From here you can send it to the clipboard,
copy it, paste it, or delete it.
7. Shortcuts Using shortcuts to open programs can save the time of clicking
through the Start menu, finding the application you want, and calling it up.
Why not place a shortcut on your desktop, and a simple double click (in Win-
dows 98 and 2000, you can set your computer to respond to a single click) will
get you up and running. Here’s how you can create a shortcut to most any file
or program you want to keep on your desktop. In this example we’ll create a
shortcut to MS Works, one of Microsoft’s word processing applications.
6. From now on, when you want to open Works, just click the
screen icon, and you’re there.
The same procedure can be used to create shortcuts from folders, files and
other programs. In fact, anytime you see something you’d like a shortcut to,
just right click on it. If “Create Shortcut” is among the options listed in the little
menu, just complete step 5. If you ever decide you want to get rid of a short-
cut, just drag it to the Recycle Bin. Don’t worry, by doing so you’re only
dumping the shortcut, not the program.
8. More Shortcuts Here is another way to create a shortcut to a new file (in
Works, for example, a new file would be an untitled, clean writing surface, a
database, or spreadsheet). Right click on any unoccupied space on the desk-
top and place the mouse pointer on New. A menu will appear offering your
working applications. Clicking any of these will place a shortcut to a brand
new file on your desktop.
9. Arranging Icons Assuming you have some shortcut icons on your desk-
top, it might be time to arrange them in some sort of logical order. It’s easy to
do. Right click on any unoccupied space on the desktop. In the pop up menu
you’ll see “Arrange icons.” Place the mouse pointer on this command and an
extension menu will appear offering you several options. You can arrange
your shortcuts by name, type, size, date or auto arrange.
When the computer boots (it might take awhile) you can try to copy files as
you would at any other time. When you’re finished working in Safe Mode,
you’ll need to shut down the computer completely before restarting. If it won’t
reboot, call a qualified technician. Unless you know you’ll have this book
handy, go to Start, select Help, and index. Type “safe mode” without quotes,
into the field, click Options, Print. This will allow you to keep printed instruc-
tions on hand in the event you need to run your computer in Safe Mode. Keep
them with your other valuable computer paperwork.
HOT TIP
11. Create A Boot Disk It is possible for various components of an operating
system to become damaged. Often a virus is the culprit. In such cases, your
computer might not boot. If this happens, you’ll need a startup disk, some-
times called a boot disk, or bootable disk. New computers come with these
disks, but we understand everybody didn’t buy their computer new. So let’s
make a bootable disk. It’s easy.
12. Proper PC Shutdown There has been discussion over the years about
the proper way to shut down a computer. Some say it isn’t necessary to ever
shut it down under normal conditions. However, there will be times you’ll
want to turn you computer off. Flipping the off switch while an application is
running is not the proper way to shut down a computer (even if you have
saved your work). The proper way to shut down a computer is as follows:
1. Save all work and shut down all open applications. If you’re won-
dering what might still be open, glance down at the Taskbar. Any
program still running will be represented by a button naming the
program and possibly an icon.
2. Click the Start button and select Shut Down. A message box will
appear offering several options. Choose Shut Down to turn the
computer off or Restart if you want to reboot immediately.
The User Friendly Guide to Internet & Computer Terms 248
13. Saving Your Monitor Despite what anyone says, your monitor should
not be left on for prolonged periods unless you are using it (yes, even with the
screensaver running). Punching the on/off button each time you want to shut
down the monitor can put undue wear and tear on the switch. The solution is
to set the monitor to shut down on its own. It’s easy. Here’s what you do.
14. Email Hotlinks Ever get an email with a live hyperlink in it? Wonder how
it got there? In most modern email programs, simply typing a URL in the
message field will produce a hot link. But it can be useful to know how to
make one the old fashioned way, just in case. In fact, you can use this method
to post links to chat and bulletin boards, as well as email. First, find a Website
or a page you’d like to send. In your Web browser, go to the address field in
the upper portion of your window and click once with the mouse. You’ve
selected (highlighted) the URL. Now go to Edit in the menu bar and select
Copy. The URL is now saved in the computer’s Clipboard and ready to paste
to its destination. Now, go to your email program, bulletin board, or chat room,
place the cursor where you want the URL and click (don’t worry, navigating
into and out of different programs or other documents won’t disturb the saved
URL). Go back to Edit, and click on Paste. The link will appear. You’ve just
attached a hyperlink.
and follow the onscreen prompts. Most programs will require that
you shut down the computer after new software has been in-
stalled.
17. System Volume Control Double clicking the small speaker icon in the
lower right toolbar lets you set the balance and volume for all the sound in
your computer. Here you’ll find master balance and volume for Synthesis,
Compact Disc Player, and Microphone. You can also use this easy method to
set these items on mute.
HOT TIP
18. PC Protection Plug your computer as well as the rest of your hardware
devices into a good surge protector. They protect your computer from unex-
pected power surges caused by storms and power company mishaps. For
extra protection during an electrical storm, simply unplug the entire surge
protector that serves your system. Chances are, it would work just fine if
tested, but do you really want to know? It might be wise to do the same thing
when going on vacation. Remember to shut down your computer properly
before turning it off or unplugging it.
19. Right Clicking There is power in the right mouse button. Take some time
exploring Windows by right clicking on everything from the desktop to indi-
vidual folders and files. A wide range of options is available.
20. More Right Clicking Right click on any file stored in a folder such as My
Documents for example. This enables you to print the file, open it, create a
shortcut and place it on your desktop, Quickview the file, send it to a floppy or
The User Friendly Guide to Internet & Computer Terms 250
zip disk, add as an attachment to an email, cut, copy, rename or delete the file,
or view the file’s properties.
HOT TIP
21. Rapid Reboot Usually after installing software or changing settings,
you’ll need to shut down your computer. There’s a way to bypass the whole
boot process. Go to Start, select Shut Down, then press the Shift key and click
Restart. While still holding the Shift key, click OK. The screen should read,
“Windows is now restarting.” This is a nice little time saver.
23. Using The Restore Disk Sometimes computers act up. Not long ago a
virus got into mine and wiped out my CD-ROM drive as well as damaging
some important boot files (I hadn’t updated the virus scan, shame on me).
After trying everything under the sun to correct the problem I realized there
was no choice but to use the restore disk that came with the computer. This
can be a time consuming task because all of your files will need to be backed
up and all of your applications will need to be re-installed. I bit the bullet and
did it, and the computer is running better than ever. If you run into a problem
you can’t overcome, check to see if your machine came with a restore disk.
Back up all files, and run the restore program (actually it’s a copy of your
computer’s operating system along with the drivers for various hardware).
This repair is usually the method of last resort.
24. Add A Toolbar You can create a toolbar containing the components of
“My Computer” by going to the desktop, left clicking on My Computer and
dragging the icon to the left, top or right margin of your screen. This immedi-
ately creates a toolbar with icons for your main and secondary drives, the
Control Panel, printers and dial-up networking. To remove the toolbar from
that location, right click in an unoccupied space and select close.
251 High Power Computer & Internet Tips and Tricks
26. E-Z Fix Computers don’t always behave exactly as we would like them to.
When encountering an error or other unexplained problem you can’t solve,
close all applications, shut down your computer and restart it. More often than
not, rebooting will eliminate the problem.
27. Find A Folder There are usually several ways to accomplish the same
thing in Windows. To view the folders in your hard drive you can open My
Computer and click (C:). You can also click on the Start button, select Run,
type in a backslash and press Enter. Yet another way to get to the (C:) direc-
tory is to right click the Start button and click on Explore.
29. View Properties To quickly view the Properties of any object, press the
Alt key and double click the object. The Properties will appear.
30. Say Goodbye When you delete a file in Windows, it is sent to the Recycle
Bin. From here you can “empty” the bin, which eliminates the file for good, or
“restore” the file, which places it back in its folder. However, if you are cer-
tain you want to get rid of a file, holding down the Shift key while deleting it
bypasses the Recycle Bin and sends it to computer never-never land immedi-
ately.
The User Friendly Guide to Internet & Computer Terms 252
31. Set Time & Date To set the time and date on your computer, either right
click on the time and select Adjust Date/Time, or go directly to the setting by
double clicking on the time.
HOT TIP
32. The Character Map Windows contains an assortment of interesting and
useful characters not found on your keyboard. Here you’ll find the copyright
symbol, the trademark symbol, the four suits found in a deck of playing cards,
and many others. To access these characters, click Start, Programs, Acces-
sories, System Tools, and finally, Character map. To use one of the symbols,
click on the desired one, click Select, then Copy. The character is now on the
Clipboard. From here you can minimize the program for future use or close it.
Bring up the target document, place the cursor where you want the symbol,
click on Edit in the menu bar, and select Paste. You should have the symbol.
33. Naming Shortcuts You can give a shortcut any name you want. Simply
right click on the icon, select Rename, and type in the new name. There are a
few that won’t allow you to rename them. If right clicking on an icon doesn’t
allow you the option of renaming the shortcut, then you’ll have to live with the
name the manufacturer gave it. The Recycle Bin is one that can’t be re-
named.
34. Scrolling As we’ve discovered, there are usually several ways to ac-
complish the same function with Windows. When viewing a long page in
Internet Explorer, you can scroll up and down using the scroll bar and mouse,
you can use the arrow keys to position the page, or you can use the space bar
to scroll down and Shift, spacebar to scroll up.
35. Adding Fonts Want to add some interesting and fun fonts to your com-
puter? Many inexpensive clipart collections come with cool fonts that are
easy to install to your permanent font folder. They can also be found on many
Websites for free. Type “clipart’ or “fonts” into any popular search engine
and you’ll find more than you know what to do with. If you choose to load
them from disk, insert the Floppy disk or CD-ROM with the font collection
and open it. Resize the window by clicking the middle button in the upper right
corner of your screen. Now go to the desktop, double click on My Computer,
and reduce this window as well. Select Control Panel and open Fonts. You
should have two windows visible, the one with your system’s fonts and the
253 High Power Computer & Internet Tips and Tricks
one on CD-ROM or floppy. Now simply click on the ones in the CD you
want, drag them to the system fonts folder and drop them in. If you get your
fonts from the Web, you’ll first need to download them to a folder you create
(see tip 114 for easy downloading instructions). You can then resize that folder
and drag and drop the fonts to the permanent system fonts folder. From then
on, the new fonts will show up in all of your applications. Just click Format
and Fonts to find them. It’s that easy.
37. Even More Shortcuts You can easily create a shortcut to a document
file and place it on your desktop, just like the shortcuts you use to open pro-
grams. Go to the folder where the document is kept. For example, many are
kept in My Documents. First reduce the size of the folder, then locate the file
and right click on it. Select Create Shortcut. Then drag the new shortcut to
the desktop and drop it there. To remove it, just drag the shortcut to the
Recycle Bin and drop it in. Don’t worry, you won’t be deleting the entire file,
just the shortcut icon.
38. Finding Files & Folders Sometimes we forget things. If you’ve forgotten
where you created a file, or even the name of the file, but remember the day
it was created, you can probably find the file. Click the Start button, go to
Find, and select Files or Folders. Click on the Date tab and enter the date or
suspected date you think the document might have been created. The com-
puter will find all documents that were created that day.
39. Print Screen Key The Print Screen keyboard button can come in very
useful. When pressing this key the computer saves whatever is on your screen
to the clipboard, not to the printer as you might expect. To print the image
from the clipboard, first open the Paint program by following these steps,
Start/Programs/Accessories/Paint. Once Paint is open, go to the menu bar,
click Edit and select Paste. If you receive a prompt asking if you would like to
The User Friendly Guide to Internet & Computer Terms 254
enlarge the bitmap, click yes. Now, to print the image, go to File and click on
Print.
40. Digital Coloring Book If you’re feeling artistic, you can create drawings
and other neat artwork in Paint (see tip 39) and display it onscreen. To do this,
you’ll need to right click on the desired image and select Set as Wallpaper.
From then on, your artwork will serve as your computer’s wallpaper.
41. Make It Big Windows has a useful feature for getting a close look at your
work called Magnifier. To activate the program go to Start/Programs/Acces-
sories/Accessibility/Magnifier. With this utility you can place the mouse cur-
sor on your work and see a magnified version in the upper section of your
screen. The settings can be changed for individual preferences.
HOT TIP
42. About Drivers A driver is a program that helps run a hardware device.
Without them, printers, CD-ROM drives, monitors, scanners and just about
every other significant piece of hardware you rely on won’t work. Some-
times, after upgrading your operating system, you’ll find devices that worked
just fine before the upgrade no longer function. Chances are, the new operat-
ing system doesn’t like the old driver. There is usually a simple solution. First,
try using the software that came with the device. If it won’t run, uninstall it
and turn your computer back on. You’ll get a message that the OS has de-
tected a new hardware device and wants you to instruct it as to which driver
to use. There will be options to insert a CD-ROM, floppy, or for the OS to
search for a compatible driver. Windows includes lots of popular drivers for
all kinds of devices. If you’re lucky, a prompt will appear telling you that the
system has located a suitable driver and you’ll simply need to click Finish to
be up and running. If that doesn’t happen, you’ll have to go the Website of the
manufacturer and download the driver. Most hardware manufacturers make
all of their drivers available free on the Net. Click on Downloads or Driver
Updates, and be ready to enter the model number of your device. From here
just follow the prompts and you’ll have the latest software installed to run
your equipment.
43. Get A Better View We’ve said it many times. There are many ways to
accomplish the same thing in Windows. To get a full screen view in Internet
Explorer there is a button labeled Full Screen in the toolbar. If it isn’t there,
255 High Power Computer & Internet Tips and Tricks
you can place it there by clicking on an empty space on the toolbar and adding
it. If that’s too much trouble, press F11 and the screen’s display image will
instantly go to its maximum size.
44. Quick Disk Copy Windows allows you to make a copy of an entire disk
quickly. Simply insert the disk you want to copy, go to My Computer, right
click on the floppy drive icon, and select Copy Disk. When the computer has
copied the contents of the disk, it will ask for a fresh one. Remove the first,
insert a new one and click OK. You’ve got a quick duplicate.
45. Hard Disk Space Check As you load new software and create files with
your computer, hard disk space is used. To find out how much storage space
remains on your hard disk, go to My Computer and right click on (C:). A pie
chart will appear onscreen showing how much disk capacity is used and how
much remains. You can do the same thing for floppies and CD-ROMs.
46. Setting Frame Colors If looking at drab gray window frames onscreen
gets you down, why not change them to a color more to your liking? To
change the color scheme of your desktop and all display windows, go to My
Computer, Control Panel and click on Display. From here, click on the Ap-
pearance tab. You’ll find options for a wide range of colors. Experiment.
Select from the color menu and click OK. If you decide that gray isn’t so bad
after all, simply select Windows Standard, click OK and your display will
return to its previous default settings.
47. Remove That Disk! Before removing a floppy disk, CD-ROM, Zip or
Jaz disk, be sure to shut down the drive. Removing a disk without first closing
the drive can cause a crash, as the computer will try to read all support drives
before reading the permanent hard drive. An absent disk can cause a fatal
error, sometimes causing system failure. Re-booting is often the only cure.
48. Attach That File You’ve just finished a letter and decide that sending it as
an attachment to an email message would get it to the recipient faster than the
Post Office. In the menu bar, select File and click on Send. If you are using
Windows Outlook Express, this will attach the file to a new email. From here,
you’ll need to type in the address, place a little note in the body of the message
telling the receiver about the attachment, and send it off. The recipient will get
your note and be able to open the letter as an attachment.
The User Friendly Guide to Internet & Computer Terms 256
HOT TIP
49. Using Send to You can send a folder or file almost anywhere you want.
Let’s say you want to copy a document you created in Word called “My
Schedule,” to a floppy disk. First locate the folder or document by clicking My
Computer and (C:). Word documents are generally stored in My Documents.
Double click on My Documents. When you’ve located the document, right
click on it, and place the cursor on Send to. You’ll be given a choice of several
destinations. Click on Floppy Drive (usually A:). Be sure a floppy disk is
inserted in the drive before attempting to copy the file. You now have a copy
of the document on a floppy as well as in the My Documents folder.
50. Select A Font Style You can select font size and style in most applications
by clicking on Format in the menu bar. Choose Font and Style from the pop
down menu. From here you have the option of selecting the size and style of
the font, bold, italics, or underlined text. Additionally, you can choose sub-
script, superscript, or strikethrough. In many programs this is also where you
can change the color of the text.
51. Cleaning Your Desktop New computers are loaded with desktop short-
cuts. Many computer manufacturers offer several online services and special
offers a user can access by clicking a desktop icon. Most of these are unnec-
essary. Once you’ve determined which you want and which you can do with-
out, simply drag and drop the unwanted ones to the Recycle bin.
53. E-Z Desktop Access Have you ever been working and needed access to
your desktop? If you don’t want to minimize the current screen to get to the
desktop, go to the Start menu, select Run, type in a period (.) in the field and
hit enter. This will open a smaller window with your desktop icons.
257 High Power Computer & Internet Tips and Tricks
54. Clean Machine Computers and related hardware love cleanliness. Here
are a few suggestions that will help you to avoid a potential messy situation.
Spray some Windex onto a rag and wipe your monitor clean. If you have a
specially tinted screen, check with the owner’s manual first. To clean input
devices such as a scanner or digital camera, check the manual for the recom-
mended procedure. The same goes for copy machines. Also, if you won’t be
using your computer for prolonged periods of a day or more, it might be wise
to shut it down. A constantly running fan draws dust into the machine.
55. Start Key Goodies The Start key (also called the Windows key) has a
wide range of uses in addition to bringing up the Start menu. It can be used in
conjunction with several other keys to provide shortcuts. Here they are:
56. Keep A Spare If you are like many people, you’ve come to depend a
great deal on your computer. Keeping inexpensive spare parts on hand can
save you lots of time and trouble. We’re not talking about a processor or extra
RAM, but a spare mouse and keyboard could come in handy. They are both
relatively inexpensive items and could be useful in the event one becomes
damaged at the most inopportune moment.
57. TLC For CDs CDs are fragile. Handle them using the edges or the center
hole. If they must be placed on a surface, place them with the printing down.
They will last a long time if treated with care.
58. Defeat Wrist Pain If you use a mouse to get around your computer
screen, it can be easy to develop wrist pain. One solution is to learn how to
initiate commands using the keyboard. Not for you? Try a trackball. Instead
of using your wrist, your fingers do most of the work, relieving much of the
discomfort associated with using a mouse.
want to print a document for future reference. We have the option of saving
all of the background images and graphics along with the text, or simply print-
ing only the text. To set Internet Explorer to print Background or Text only, go
to Tools on the menu bar and select Internet Options. Select the Advanced
tab and scroll down to Printing. Here you can select or de-select the Print
background colors and images option.
61. Resize Buttons Would you like to have the Minimize, Maximize, Restore
and Close buttons in the upper right corner of your screen a little larger and
easier to access? It’s not hard to resize them. Right click on any unused
portion of your desktop, select Properties and click the Appearance tab. In
the lower portion of the dialog box you’ll see three fields, select the one la-
beled Item. Scroll through the choices until you find Caption Buttons and
select it. Immediately to the right of this field is a size box. The default setting
is probably at around 18. You can bump it up to 22 - 25 for very easy button
access, and click OK to save the new setting.
62. No Need To Click Do you ever feel just a little mouse-dependent? Every-
thing that can be accomplished with a mouse can also be done with the key-
board. To move a window around the desktop, press Alt and the space bar. A
pop up menu will appear. Press M for move. A four-headed arrow will ap-
pear at the top of the window. You can now use the arrow keys to position the
window. When you have it where you want it, press Enter. Who says you’re
mouse-dependent?
63. No Need Continued You can also change the size of any active window
using the keyboard. Again, press Alt and the space bar. This time press the S
key for size. The four-headed arrow will appear. Use the arrow keys to size
the windows. Press Enter when you have it the size you like.
259 High Power Computer & Internet Tips and Tricks
65. More Customizing To further customize your title bars why not change
the fonts too? Right click on an unused portion of your desktop, select Proper-
ties and click on the Appearance tab. In the field labeled Item select Active
Title Bar (this won’t change the gradient). You can now select one of the
many fonts available with Windows. Once you’ve found one you like, click
Apply to save the setting.
HOT TIP
66. Disable Call Waiting Call waiting can play havoc with your online con-
nection. To disable call waiting while online click the Start button and select
Settings. From the pop up menu, click Control Panel. Here you’ll find an icon
(telephone) for your modem, double click on the icon. Click on Dialing Prop-
erties and then click, “To disable call waiting...” Type in *70 or *7. If that
doesn’t work consult your ISP for instructions.
67. For Lefties Only Right handed people have a lot to take for granted.
That’s because the world is set up for them, including the mouse for your
computer. If you want to change the default button for your mouse, click
Start, Settings, and click Control Panel. Double click on the Mouse icon. Here
you’ll find a dialog box called Mouse Properties. You can change the default
button, along with the look, size, and speed of the cursor (pointer), and add
trails to it while it moves. While you’re here you might want to change the
speed with which the computer responds to a double click.
68. Personalize Settings More than one person in your household using the
computer? Why not customize the machine for each user? Click Start, Set-
tings, and Control Panel. From here, double click the Passwords icon, identi-
fied by a colorful set of keys, and click the User Profiles tab. From here
select, “Users can customize their own preferences and desktop setting.”
The User Friendly Guide to Internet & Computer Terms 260
Now, close all open applications and shut down the computer. When you
reboot, you will be asked to enter a password. This will be the first profile. Do
this as many times as you need to establish the number of profiles necessary.
Each user can now set up Windows to match his/her personal tastes.
69. Sound Effects Perhaps you’ve noticed different sounds associated with
common software functions. For example, when you shut down a program,
you hear a particular sound effect. You can change these sounds, using a
fairly wide range of selections. Click Start, Settings, and Control Panel. From
here, double click the Sounds icon. You can now choose individual sounds to
associate with certain functions or a sound theme. Experiment and have fun.
70. Free Up Disk Space If hard disk space is at a premium, you can free up
some by getting rid of your Temporary Internet Files. Every time Internet
Explorer takes you to a new Web page it saves a shortcut to the page in its
cache. These files can occupy a considerable amount of disk space and are
not needed. Go to Start, Programs, and double click on Windows Explorer.
Here you’ll find a group of files laid out in tree structure. Double click on
Windows, and then locate the Temporary Internet Files. There’s really no
need to look at each one individually, as there could be thousands. Right click
on the folder and click Properties. Here you can find out how much space is
being used by the files in this folder. To delete the files, you’ll actually need to
open the folder. Once open, click Edit in the menu bar, and click Select All.
Now go to File in the menu bar and click Delete. They won’t be sent to the
Recycle Bin, they’re gone for good.
HOT TIP
71. Adding Destinations to “Send to” A quick way to send a copy of a file
is to right click on the file, select “Send to” and click on the desired destina-
tion. There are several default destinations in the Send to menu such as the A:
drive and My Documents, but you can add as many as you want. Right click
Start and click on Explore. Under Windows, find the Send to folder and open
it. On the right side of your display you should see the current destinations.
Let’s say you wanted to add the Recycle Bin. Reduce the size of your screen
by clicking the middle button in the upper right portion of your display. Find the
Recycle Bin on your desktop and right click on it. Click Create Shortcut. A
shortcut will be placed on your desktop. Drag it into the folder with the other
Send to destinations. You can now dispose of files using the Send to com-
mand. You can do this with all accessible files and folders.
261 High Power Computer & Internet Tips and Tricks
72. Where Is It Going? Ever wonder what is going to happen to a file you’re
dragging once it gets to where you’re going? An arrow in the lower right hand
portion of the icon means the file will become a shortcut. A plus sign means
the file will be copied, and no indicator means it will be moved.
73. Change Of Scenery Windows allows us a wide variety of fun and some-
times even frivolous options. If you’d like to see some nice background scen-
ery when you open a folder, it can be arranged. Open My Computer and click
on (C:). Select a folder and open it. In the menu bar, click on View and choose
Customize this folder. From here, select “Choose a Background Picture.”
The Windows wallpaper menu will appear. After selecting a pattern, follow
the simple instructions to finish.
74. Undo A Mistake Most software applications these days are pretty forgiv-
ing. If you’ve made a serious mistake that you think could wipe out the last
hour or so of your work, there is probably a remedy. The trick is not to do
anything else until you try it. Even a mouse click could keep this from work-
ing. In the menu bar select Edit and click Undo Edit or simply Undo. An even
faster way to accomplish this is to press Ctrl and Z.
75. Quick Move Right clicking on a folder or file and selecting Send to, will
move a copy of the document to a chosen destination. But what if you want to
actually move the file without copying it? Hold down the Shift key while
clicking on Send to. This will move the file without making a copy.
76. Abort Mission Ever start an application that seems like it’s taking for-
ever to open? You might launch a program and change your mind before it
finishes loading. You can stop a program from opening by holding down the
Ctrl, Alt, and Delete key together. Contrary to computer folklore, this won’t
shut down your computer (doing it twice will though). This will bring up the
Task Manager asking you if you want to End Task. Click the appropriate
button and the launch will be aborted.
77. Reality Check Feel like you’ve been working for days? Lost track of
the date? No calendar around? Hold the mouse pointer over the time display
and the date will appear.
78. Lost Passwords Have you forgotten your Windows logon password?
Don’t have it written down anywhere? Okay let’s fix it. Press Esc on the
The User Friendly Guide to Internet & Computer Terms 262
logon dialog box. In a DOS prompt window type dir *. PWL Delete the
PWL file with your name in front of it. Shut down Windows. When you
reboot you will have the opportunity to create a new password.
79. Renaming Stuff You can rename icons, files, and folders a couple of
different ways. First, right click on the item and select Rename. Simply type
in the new name when prompted. If that isn’t simple enough, then select the
item you want to rename and press F2. Type in the new name.
80. Checking System Profiles Ever wonder exactly what you’ve got inside
your computer in the way of hardware and software? Microsoft has compiled
all of the information specific to your system in a little program called
Msinfo32.exe. To take a look at what’s installed on your machine, click Start,
Run, type Msinfo32.exe into the prompt box and click on OK. Your system
information will be displayed.
81. Setting Screensaver Launch Time How long is your computer idle
before your screen saver launches? Good question. You can easily set the
time it takes before it takes over your monitor. Click Start, Settings, and click
on Control Panel. Double click on Display and click the Screen Saver tab.
Here you can set the number of minutes the computer is to be idle before
launching the screen saver.
82. Beginning & End Ever find yourself scrolling through a long document to
get to either the beginning or end of it? That isn’t necessary. To get to the top
of a file, simply press Ctrl and the Home key. To quickly get to the end, press
Ctrl and the End key.
83. E-Z Disk Formatting These days virtually all floppy disks come format-
ted. A formatted disk simply means it is ready to accept and read data. Occa-
sionally you’ll run into an unformatted disk. When you try to use it, you’ll get
a message saying, “Disk requires formatting,” or something similar. To format
a floppy, insert a disk into its drive (usually A:), click My Computer, then right
click on the icon for that drive and select Format. In the check box click on
“Full.”
your viewing displeasure immediately after booting. To get rid of it, click Start,
go to Programs and Startup. You’ll probably find the culprit here. To get rid of
it, right click on the name of the program and click Delete.
85. More Scrolling You can scroll up and down in most browsers using your
mouse and the scroll bars. You can also scroll up and down with the arrow
keys. To scroll down, you have an additional tool in the space bar.
86. Tunes Did you know that in addition to running software, your CD-ROM
drive will play music CDs? It’s true. You can pop in your favorite CD while
working on your computer.
87. Quick Keys Right clicking on an object with your mouse offers a wide
range of possibilities. You can accomplish the same thing with the keyboard
by first selecting an object and pressing Shift and F10.
88. Delete Recycle Bin Confirmation Prompt Have you noticed that be-
fore you actually delete an item you are asked if you are sure you want to
send it to the Recycle Bin? Some users don’t need to answer this question
each time they delete a file. To get rid of this prompt, go to the desktop, right
click on the Recycle Bin and click Properties. Under the Global tab you’ll find
a check box with “Display Delete confirmation box” beside it. Uncheck it and
you’ll stop receiving the message.
89. Hardware Inventory Like to get the scoop on every last piece of hard-
ware in your system? Click Start and Run. Type “hwinfo /ui” into the address
field without the quotes. A window will appear containing detailed hardware
profiles for your computer as well as all connected devices. Sorry, Windows95
and 98 only.
90. Setting Click Speed If you have difficulty double clicking your mouse
fast enough for it to react, there are a couple of things you can do. The first is
to simply click on an object once and press the Enter key. You can also change
the double click speed of your mouse easily. Click Start, Settings, and Control
Panel. Double click the Mouse icon. Select the Buttons tab. You can adjust
the click speed and test it before confirming your setting by clicking OK.
91. Mouse Cleaning Ever have trouble getting your mouse to do what you
want it to? It probably needs cleaning. Some mice have a convenient little turn
The User Friendly Guide to Internet & Computer Terms 264
and lock device that allows you access to the inner workings, others have a
couple of screws that will need to be removed. Open the bottom of the mouse
and clear out any dust or pet hair. There are also small rollers inside that
attract dirt. I use a toothpick to remove it. You can buy pressurized air in
aerosol cans to blow out the dirt, but usually, an old fashioned birthday candle
puff or two will do the trick to get rid of stray particles of unwanted debris.
92. Window Alignment Ever click on a link only to have a window appear
too far to the top or right of the screen, making access to the Minimize, Maxi-
mize, Close buttons impossible? You can close the new window by right click-
ing on the icon that has appeared in the taskbar, and clicking Close. You can
maximize the window without the button by double clicking on the title bar.
But an easier way to deal with it is to simply drag the window into better view
by clicking on the title bar with your mouse, and moving it a little to the left
with the mouse button pressed. When you have it where you want it, release
the button.
93. Minimize Open Windows There are times you’ll have more than one
window open. To minimize them all at once right click on any unoccupied
section of your taskbar and click Minimize All Windows. To get them back,
click Undo Minimize All.
94. E-Z Printing Most applications offer you two ways to send a document to
your printer. One way is to click File in the menu bar and click Print. This will
bring up a dialog box with some useful information about your printer. In the
section labeled Print range, you’ll have the option of printing the entire docu-
ment by checking All, or just printing the pages of your choice by clicking the
Pages box. To print a single page in the middle of a multi-page document, type
the page number into both boxes under the Page option. To print pages two
through six in a ten-page document, type two in the first box and six in the
second. Another way to send a document to the printer is to click on the
printer icon in the Toolbar. This will send the entire document directly to the
printer, without the prompts.
95. More E-Z Printing Have you ever wanted to print just a few lines of a
document or Web page? Select (highlight) the text by left clicking your mouse
on it and dragging the mouse over the desired material. In the menu bar, go to
File and select Print Range. You’ll print just the selected text.
265 High Power Computer & Internet Tips and Tricks
96. Close A Program To quickly close an application after saving your work,
press Alt and F4. To quickly shut down your computer with no applications
open, again, press Alt and F4.
HOT TIP
97. Optimal Operating With Smart Clipboard Use When copying large
files such as graphics to the Clipboard, don’t keep them there longer than
necessary. While there, they use a good deal of your computer’s memory. To
clear a file from the Clipboard, you can actually open the Clipboard and delete
the file. To open the Clipboard, press Start, Programs, Accessories, System
Tools, and click on Clipboard Viewer. To delete the contents, click Edit and
Delete. A quicker way to accomplish almost the same thing is to select a
single word and Copy it. That will remove the large file and replace it with the
single word, freeing up memory. If you find yourself using the Clipboard a lot,
why not place a shortcut for it on your desktop? Go to the Clipboard Viewer
as described above, right click on the icon, and select Create Shortcut.
98. Dragging An Object Cutting and pasting is an easy way of moving mate-
rial around a document, but for some purposes, there’s an even easier way.
Say you decide to move the last paragraph in a document to the middle of the
page. Place your mouse cursor at the beginning of the paragraph and highlight
it by holding the button while dragging the mouse over the text. Once se-
lected, place your pointer on any part of the shaded text. The word “Drag”
should appear beside your pointer. Left click the mouse, hold the button, and
drag the highlighted section to the new location.
99. E-Z Undo Pressing Alt and the backspace key will undo your last entry.
101. Clever Keys As you access commands in the menu bar you’ll notice
some of them have an underlined letter. To initiate the command without the
mouse, press Ctrl and the letter.
102. Date Stamp Do you need the date and time in a document you’re
creating? Many word processing programs make it easy to enter them. To
The User Friendly Guide to Internet & Computer Terms 266
automatically place the time and date into a document, click Insert and click
on Date and Time. A group of date and time options will appear. Select the
one you want and click Insert. In some programs, you can even have the
current date and time updated at the time of the printing of the document.
Web Tips
103. Keep A Log As you surf the World Wide Web you are bound to sub-
scribe to various newsletters, bulletin boards, chat forums, or sign up for sev-
eral free email accounts. Many of these services require that you register and
get a user name and password. You’ll need these each time you log on. Even
though you can tell your computer to remember these keywords, sometimes
they get erased as a result of a power failure or unexpected crash. Therefore,
it is essential that you keep a log with your various user names and passwords
handy. Each time you sign up for an online service simply jot down your key
words and you’ll always be ready for smooth surfing.
104. Free Email With so many free email services offered on the World Wide
Web, it might be wise to have several accounts. It is becoming more common
for information gatherers to ask for your email address along with your other
vital statistics such as name, address, telephone number etc. Recently I was
offered 15 percent off my next purchase at one of the major book retailers
just for giving them my email address. Email is often used for various promo-
tions and solicitations just as snail mail is. To avoid having your personal email
box cluttered with commercial offers, why not have one of your free email
accounts bear the brunt of the promotions that are sure to come as you be-
come more active online.
105. Basic Search Engine Among its many functions, the Internet has to be
the world’s most comprehensive library. Whenever a question comes up, get
in the habit of using this wonderful resource. One of the more popular search
engines should help you in your quest for knowledge. Simply type in your
question or keyword and hit the send button. Chances are good you’ll end up
with an answer. For a list of great search engines, check page 277.
106. Free Home Page Many Internet Service Providers (ISPs) provide some
disk space on their servers so clients can create a Web page or two. Check
267 High Power Computer & Internet Tips and Tricks
with yours to see if this is an option and what you need to do to get your page
up if it is.
107. Time Tracking It’s easy to become distracted during a fun or produc-
tive online computer session. Sometimes you’ll open several programs and
forget about the Web while working. All the while, time is ticking away. That’s
not much of a problem if the arrangement you have with your ISP allows for
unlimited use. But if you are being charged by the hour, precious time could be
wasting.
8. Now set up an email account. You’ll need to enter your name, user
name, and email address. Often, but not always, it will be your
user name. If you have a common user name, it’s likely to already
The User Friendly Guide to Internet & Computer Terms 268
109. Change Your Homepage To set, or change the Home page (the Web
page that first displays when you log onto the Internet) in Internet Explorer,
logon to the Web and go to the page you want to use as Home. Click Tools in
the menu bar and select Internet Options. Click on Use Current. From then
on, that will be the first page you see when logging on. There is always more
than one way to accomplish something with Windows. If you know the URL
of the page you want to set as Home, go to the desktop, right click on the
Internet Explorer icon, and select Properties. This will take you to the same
dialog box you found in the previous example. Now you can simply type in the
URL and click OK.
110. Connection Options The method you use to connect to the Internet
will often determine the speed of your connection. Most people use the 56Kps
(kilobits per second) modem that came with their computer to connect via a
telephone line. However there are a couple of alternatives to phone modems.
First there’s the cable modem. This uses the same type of coaxial cable as
your television and is available in many cities. It allows you to connect using
an additional cable jack and will not interfere with your television. Connection
speeds vary from 300Kps to 1 Mbs (megabits per second). Costs range from
between $40 to $60 per month with a set-up charge of around $100. Finally
(for now), there’s Digital Subscriber Line (DSL) a high-speed connection
available in many cities. It works with your telephone line but allows you to
269 High Power Computer & Internet Tips and Tricks
use the phone while online. The monthly charge is around $50. You’ll need a
DSL modem, which runs in the $200 to $300 range. They can be leased from
most carriers for a small monthly charge. Connection speeds are as high as
1.5 Mbs. That’s fast!
111. Finding Online Freebies There are so many free offers available on
the Internet it can sometimes become overwhelming. With a few mouse clicks
you can find everything from clipart and coffee, to magazines, voicemail,
email, and Web pages. Why is there so much free stuff in cyberspace? See
the e-commerce article on page 209. In the meantime, go to any major search
engine (see page 277), type in “free offers” or simply “free stuff” and get
your freebies now.
113. Censored The best way to keep children from straying to Websites
you’d rather they didn’t visit, is to monitor their use of the computer. Of
course, that isn’t totally practical for most parents. The alternative is to em-
ploy filtering software such as Net Nanny. When activated, this program
keeps users from accessing inappropriate material. It can also deny unautho-
rized individuals the use of personal information.
114. Free Software Among the many useful free things you’ll find on the
Web are software programs. They’re easy to download when you know how.
Simply follow the instructions on the Website you’re downloading from. Just
before you receive the download, the computer will ask you where you want
to put the file. You should have a folder where you keep all of your down-
loaded files ready before you start. To create a folder, on the desktop, click
My Computer and select (C:). From here right click on any empty space. A
menu will appear. Select New. Another menu will appear with several choices.
Select Folder. Give this folder a name like “Web Downloads” or something
similar. Now you’ve got a place to store your Web files. When the dialog box
appears asking where you want to store your download, it will ask, Save As?
Click on My Computer, select (C:). Here you will find your new Web Down-
loads folder. Select it and the program will be stored there for easy future
access.
The User Friendly Guide to Internet & Computer Terms 270
116. Check Connection Speed To check the speed of your Internet con-
nection, place the mouse cursor over the connection icon in the Taskbar. The
connection speed will be displayed. For more information, right click on the
icon. This will tell you how long you’ve been online, the amount of data re-
ceived, and a button for disconnecting.
117. Add A Favorite A quick way to add a Web page to your favorites file is
to press the Ctrl and D keys together. If the page belongs in an existing folder,
you can go back later and drag and drop it into the destination folder.
118. Another Search Basic Search engines can be extremely useful in find-
ing information on the Web, but each one has its own little quirks. Before
using a search engine, check out the Help section most offer. Here you can
learn methods for maximizing your search with that particular engine. If you
have trouble locating information on one engine, try another.
119. Find The Boss Ever visit a Website and find absolutely no reference to
the owner of the site. You can learn the registered owner of a domain name
rather easily. You’ll need to log onto the Internet and go to http://
www.networksolutions.com. Near the top of the page on Network Solu-
tions you’ll find an icon labeled “WhoIs Lookup.” Click on this icon and type
in the domain name that has aroused your curiosity. The registered owner will
be displayed.
120. Check The FAQ FAQ stands for Frequently Asked Questions. FAQs are
almost standard operating equipment on most Websites, chat and bulletin boards
these days. Before posting a question or emailing a busy webmaster, go to the
FAQ page and read through it. Chances are, your question is posted there
along with a satisfactory answer. It can be considered bad netiquette to ask
redundant questions.
121. Page With A View The View option in Microsoft Internet Explorer
offers useful and convenient assistance for your Web surfing pleasure. Inside
of View, under Toolbars, you can add and remove a wide range of useful tools
allowing you to scroll backward and forward to pages, easily cut and paste,
271 High Power Computer & Internet Tips and Tricks
refresh the page, access email or print what’s onscreen. You can look at a log
of previously visited pages in History, and enlarge the page you’re viewing.
The pop up menu found under Explore Bar splits the screen into two windows
allowing you to access MSN for a Web search of people, places, and things;
it can display your Favorites folder or History as you surf; provide access to
many discussion boards, and offers a computer or Web related Tip of the Day,
courtesy of MSN network. Why not spend some time exploring View?
122. Setting Browser Font Size Internet Explorer allows you to set the size
of the text you see on Web pages, from very small to very large. Go to View
and select Text Size. A pop up menu will appear with a several choices for
text settings. Experiment until you find one you like.
HOT TIP
123. No Cookies Thank You Cookies are messages sent to your browser by
some of the Websites you visit. They are designed to identify you based on
information collected from previous visits and customize future content, some-
times offering you specific products and services. Some people feel this is a
breach of privacy. You can easily disable cookies. In Internet Explorer go to
Tools and select Internet options. Select Security, and scroll down to Cookies.
From here you can choose to receive a prompt each time a cookie is launched
so you can decide whether or not to accept it. Or, you can disable cookies
from being stored in your browser as well as stopping cookies during each
online session. Simply check the box that suites your desires.
124. Save Results Have you ever hit the jackpot when using a search
engine? You’ve typed in your keyword and the results were all right on target.
In fact, there is more useful information than you could review in several
sessions. Why not add the “results” page to your Favorites for future use?
125. E-Z Web Search When using Internet Explorer 5, searching for infor-
mation can be a breeze. Type a word or phrase into the address field and
press Enter. You’ll get a list of possible hits displayed on the left of your
screen. If your search word actually points to a Web page, the browser will
bring it up.
126. More Like This? Found a site with interesting information? Wish there
were more like it? There probably are. In Internet Explorer go to Tools in the
The User Friendly Guide to Internet & Computer Terms 272
menu bar and click on Show Related Links. You’ll get a list of hyperlinks
pointing to similar sites.
128. Finding Plug-Ins To find out what plug-ins came with Netscape Navi-
gator type “about: plugins” without the quotes in the address field. A list of
plug-ins included in the version you are using will be listed.
129. Getting Around The Web Need to change your address? Your Web
address I mean. To type in a new domain name you have two options. You
can single click your mouse in the address field. This will highlight (select) the
current address. Now just type in the new URL. If you’re more of a key-
board person, you can select the address field by pressing Alt and D.
HOT TIP
130. Radio Anyone? In Internet Explorer 5 you can listen to international
radio while working. Just right click on any unoccupied space on the Toolbar
in the browser, and click Radio. The Microsoft Media directory will open.
Click on Radio Stations, then Radio Station Guide. You can also click on
Station Finder to select stations according to the band on which they broad-
cast such as AM, FM, etc. You’ll find choices for radio broadcasts from all
over the world. To exit radio mode, right click again on any unused spot on the
Toolbar and deselect Radio. To remove the Media page simply hit the Back
button. This is a great argument for going to MSN’s Website right now and
upgrading your browser.
131. History Lesson Forget where you’ve been on the Web? Sure, you
found a site that was so cool you were sure you’d never forget it, but now you
have. You can get back to it if you were there recently. Just click on the
History button in your browser’s toolbar. History not there you say? Bring it
down by right clicking on the Toolbar and clicking Customize. A menu will
appear showing all of Explorer’s available tools. Select History and click Add.
You can now access the sites you’ve recently visited by double clicking on
them.
273 High Power Computer & Internet Tips and Tricks
132. More History If you’d like to keep pages you’ve visited in the History
Folder longer than 20 days (the default setting), click Tools, and Internet Op-
tions. Under the General tab you’ll find History. Look for “Days to keep in
history,” and make the appropriate adjustments. You can also clear all of the
pages from the History folder here.
133. Search Engine Folder If you plan to use the World Wide Web as an
information resource, you’ll need to get good at using search engines. Though
the principles are the same, each search engine seeks out information a bit
differently. Why not create a folder in Favorites containing the top search
engines so you’ll always have them close at hand. See page 277 for a list of
the top 25 engines.
134. Safeguarding Your Favorites Don’t know what you’d do without your
Internet Explorer Favorites Folder? Why not save it? You can export a single
file or the entire folder to a location on your hard drive or to disk. It’s easy to
do. With the browser open, click on File. From the pop down menu, click on
Import and Export. The Import/Export Wizard will appear. When prompted,
select Export Favorites and click Next. Your Favorites folder will be selected
(if you wanted to select a single file, you’d simply click on the desired one),
click Next. By default, the next prompt will offer to send the Favorites folder
to the My Documents folder, stored on the (C:) Drive. If this is okay, click
Next, if not select Browse. A window will appear titled Select Bookmark
File. Click on the small arrow in the upper address field. This will offer you
many destination options. If you want to store the folder on a zip or floppy,
select the appropriate one and click Save. You’ve now got your Favorites
backed up for safekeeping.
135. Rush Hour Just like the freeway system, the Information Superhighway
experiences congestion. Perhaps you’ve noticed a decrease in navigation speed
at certain times. It seems to happen in the late afternoon and early evening
when many people decide to get online and surf. If you have important work
to do, avoid frustration and try to keep from going online during rush hour.
136. Simple Searching Aside from being a fun place to hang out, the Internet
is loaded with useful information. Whenever you want to find out about a new
product, or locate even the most obscure information, simply go to your favor-
ite search engine, type in a word or phrase, and chances are, you’ve found
what you were looking for.
The User Friendly Guide to Internet & Computer Terms 274
137. Who’s The Boss? Another way to find out who owns a particular
domain name is to type http://205.177.25.9/cgi-bin/whois? into your
browser’s address field. This will bring you to a page where you’ll need to
enter the domain name. The behind-the-scenes information will be displayed.
138. Web Routing You can actually trace the route and identify the servers
routing any Web address to your computer. First, you’ll need to open a DOS
window. Press the Start key, go to Programs and click on MS DOS Prompt.
Next to the flashing cursor type “tracert” without the quotes and the domain
name. For example, tracert www.UserFriendlyBooks.com. You’ll need to
be online to do this.
139. Redial Weren’t able to get online on the first try? Why not set your
computer to keep dialing until it does logon. Press Start, Programs, Accesso-
ries, Communications, and click on Dial-up Networking. In the menu bar click
on Connections and Settings. A check box will appear. Click in “Re-dial” to
activate your choices. You can choose any number of re-dial attempts be-
tween 2 and 200 where it asks, “Before giving up retry.” You’ll probably want
to set “Between tries wait,”__min.__sec. at zero.
140. Connection Check Does it seem to take forever before you get con-
nected to the Net? To be sure you are connecting at optimal speed, try this:
On your desktop double click My Computer and then double click on Dial-up
Networking. Right click on your connection icon, and click Properties. From
here, click on the Server Types tab. In the dialog box that appears under
Advanced Options, be sure that “Log on to Network” is unchecked. If it was,
that’s what was slowing down your connection time.
Email Tips
141. Case Sensitive Email addresses are not case sensitive, so if you want
to use capital letters it’s okay, your message will still get there.
142. Email Access Many ISPs allow you to access your email directly from
their Website. To see if yours does, log onto their site and look for an email
icon or a link with the name email or simply mail and click on it. From here
you’ll need to enter your username and password to get your mail. This comes
in really handy when you’re away from home, and have access to the Internet.
275 High Power Computer & Internet Tips and Tricks
143. Wingdings To dress up and add a little fun to email and other corre-
spondence, select Format in the menu bar, then Fonts, and scroll down to
Wingdings. These are cool symbols that will add pizzazz to your letters. Take
a look.
144. Email Test Have you ever had someone tell you they didn’t receive an
email you sent? Maybe your email account isn’t properly set up. To test it you
can open an email account with one of the many free email providers on the
Web and send yourself a message. (MSN, Yahoo, and USAnet are just a few
of the free providers of personal and business email accounts). If you get the
message you’re okay; if you receive a message stating something like “Unde-
liverable,” you’ll need to check your account with your ISP.
145. Attachment Alert Email will not introduce viruses into a computer but
opening attachments to email can. Therefore, before sending attachments
like they were going out of style, be sure the recipients welcome them. A
simple note (via email) to ask your friends how they feel about getting attach-
ments is common courtesy. By the same token, be careful when opening
attachments. It’s a good idea to know the sender. If you plan to open any
email attachments, an up-to-date virus scan program should be in place.
HOT TIP
146. Block Undesired Email Is there someone you’d rather not receive
email from? You can easily block messages from selected senders. First se-
lect a message from the individual in question by single clicking on it in the
Inbox. Then go to Message in the menu bar and select Block Sender from the
drop down menu. A prompt will appear asking you if you want to block mes-
sages from this individual or company. Click Yes. Have a change of heart?
Go to Tools and select Message Rules. From the pop up menu select Blocked
Senders List. This will display a list of individuals you have blocked. To re-
instate one or more, select the name by single clicking on it and press Re-
move. They are now able to send you mail again.
147. Email Return Request You know Outlook Express is working because
of all the junk mail you’ve been getting, but why doesn’t anyone answer you?
You can request that people receiving your messages notify you when they
The User Friendly Guide to Internet & Computer Terms 276
get your email. Go to Tools in Outlook Express, select Options and Receipts.
Click in the check box requesting a Read Receipt.
148. Spell Checker Outlook Express, Microsoft’s email program will check
your spelling before you fire off a message, if you want it to. Just click on
Tools in the menu bar, select Options and the Spelling tab. From here you can
set the program to check for misspelled words, suggest replacements, ignore
certain types of words such as those spelled in uppercase letters, words in-
cluding numbers, Web addresses, and more.
149. Your Address Book Outlook Express allows you to keep an email
address book, and you don’t have to manually enter the names of all your
contacts. Addresses can be automatically placed in the Address file by simply
replying to an individual once. To set Outlook to do this, go to Tools, Options,
and select Send. Here you’ll find several options concerning your mail. Select
“Automatically put people I reply to in My Address Book,” along with any of
the other useful options listed.
150. Customize Email You can customize your outgoing email by changing
font size and style, and adding colorful backgrounds to messages. You can
even include your business card. A great way to see how your custom mail
appears is to send yourself several test messages at the free Web based email
account of your choosing. Check with Yahoo or Hotmail to set up a free email
account. To customize your mail go to Tools, Options, and select the Compose
tab. Here you will find the Stationary Wizard. Have fun!
151. Sending Copies Sending out birthday invitations by email? You can get
the job done without having to write to everyone on your list individually. To
mail the same message to a group of people, type the email addresses into the
Cc (carbon copies) field. Be sure to place a comma between them. By put-
ting the addresses here, all the recipients will be able to see the entire list. For
complete anonymity, type the names into Bcc (blind carbon copy). Recipients
of the message will not know who else is getting it.
277 High Power Computer & Internet Tips and Tricks
153. Free Offers Offer something free on your site. Doing so allows you to
include the words “free offer” when listing with search engines. There are
many people surfing the Net looking for free stuff. You can get them to your
site with the free offer, it’s up to you to interest them, and keep them coming
back with useful content. What might you offer? Email, software, contest
entries, consulting in your area of expertise, classified ads... Use your imagi-
nation. You don’t need to run your own contest or free email service, you can
become an affiliate of a site already offering these services and provide the
appropriate links.
154. Make It Useful If nothing else, the Internet is an information utility. You
can keep visitors coming back to your site by providing useful information and
keeping it regularly updated. One way to do this is by posting a daily tip on a
subject in your area of expertise. Another is to produce a quality newsletter.
You might consider offering breaking news stories or the weather. You can
access all of these services by becoming an affiliate of a site whose primary
business lies in these areas.
155. Make It Unusual Offer something unusual on your site to get some
buzz going. Although it wasn’t quite the frosting on my cake, the movie Blair
Witch Project received tons of publicity along with millions of Website visits
with viral marketing. Viral marketing is simply buzz created through word of
mouth and personal email. The hook that made Blair Witch cool was the ever-
present question of the story being true. That, coupled with a bit of the maca-
bre, tweaked people’s curiosity just enough to make the producers of the
project wealthy - well, I guess that’s probably relative.
The User Friendly Guide to Internet & Computer Terms 278
Keywords
The most common way a search engine looks for documents is the
keyword. The way this works is, when a Website creator or administrator
submits a Web page or document to a search engine, they single out the most
common words they feel a person would associate with the document. For
example, if I were submitting a site called MarvelousMakeovers.com, (this
domain name was still available Sept., 2000) a site devoted to woman’s cos-
metics and beauty, to the top search engines, I’d probably list descriptive
words like, health, beauty, makeup, cosmetics, eyeliner, lipstick etc. Addition-
The User Friendly Guide to Internet & Computer Terms 280
ally, if the site offered a free beauty newsletter as a promotion, I’d also use
words like beauty tips, free newsletter, free subscription, etc. Finally, if the
site sold cosmetics, I’d list the type of product and the manufacturer’s names
individually, like Elizabeth Arden, eyeliner, hand lotion, etc.
Clustering
This type of search takes a word or words and tries to relate it to other words
near it or about it. Also called concept base indexing, clustering associates
similar and related words to your search request. For example, if you entered
“dog,” an engine using this method might bring up documents containing, ken-
nel, fleas, biscuit, puppy, show, etc.
A general search is just that. You type in a word or a phrase and the
engine returns a list of documents. If your topic is broad, like Christmas, it’s
likely you’ll get hundreds of results to examine. For more specific information
on Christmas, it’s still possible to use a general search. Depending on what it
was you were looking for, you might try, Christmas Recipes, Christmas Cards,
or Christmas gifts. Unless you are seeking very specific information, you
should usually start your search with a general search.
Advanced searching can bring us the specific information we seek. And
it’s become popular for most of the top search engines to offer Advanced
Search Methods by simply clicking a button. Let’s take a look at a couple here
to get a feel for the more common ones.
Say you were looking for information on Galapagos Island Sea Turtles.
First, type into the search field, Sea Turtles (this would be a general search).
The first few returns would be general information about sea turtles, but as
you scroll down the list, it’s likely you’ll find results about different species of
sea turtles and sea turtles of varying regions.
If this didn’t turn up what you were looking for, you could try typing in
Galapagos “Sea Turtles,” placing quotations around the words Sea Turtles.
281 High Power Computer & Internet Tips and Tricks
This tells the engine that your primary interest is sea turtles. In searching
HotBot, I typed Galapagos “Sea Turtles” and it returned three links to
Galapagos Sea Turtles. But say you tried this and found your results heavily
leaning to documents about Galapagos tourism, or nature cruises, without any
reference to sea turtles. You might then type, - Galapagos, then “Sea Turtles.”
The negative sign theoretically takes the focus off of Galapagos, and places it
on turtles. If you were turning up everything but Galapagos, you would try +
Galapagos, hopefully bringing the focus more to that location.
Utilizing search engines to their fullest is more an art than a science. Each
engine has slightly different parameters it uses when searching. We’ve talked
about a couple of generic methods for fine-tuning a search. However, the
best way to refine a search is by going to the “Advanced Search” section of
a search engine (many of the top engines have this option available) and
following the easy instructions. Here, you can focus your search using tools
such as date, time, results must contain the word, must not contain the word,
etc. Remember, there are thousands of search engines out there, some very
specific. If you are interested in the Civil War, there are probably several
search engines specializing in information about it. How would you find them?
I’d go to one of the biggies and type into the address field, “Civil War search
engines.” First, without the quotes. Happy hunting!
www.Yahoo.com www.InfoSpace.com
www.Goto.com www.NationalDirectory.com
www.AltaVista.com www.DirectHit.com
www.LookSmart.com www.Searcholopis.com
www.Lycos.com www.About.com
www.Anzwers.com www.Chubba.com
www.HotBot.com www.MetaCrawler.com
www.Go.com www.Google.com
www.Excite.com www.Ask.com
www.Snap.com www.ScrubTheWeb.com
www.AOL.com www.Search.com
www.WhatUSeek.com www.Dogpile.com
www.DejaNews.com
The User Friendly Guide to Internet & Computer Terms 282
Boolean search a search that expands or limits the number and variety of
documents found. This is accomplished with the use of words such as
And, Or, and Not.
de-listing the removal of a document from a search engine for a wide range
of reasons.
direct hit a system used by select search engines to determine a user’s re-
quests and the relevancy of the results. This is accomplished by monitor-
ing the returns selected, and the time spent viewing the resulting docu-
ments.
false drop a document returned from a search engine that is not relevant to
the query.
full text index refers to an index cataloging every word contained in a docu-
ment including stop words such as a, an, and, the, to, etc.
fuzzy search a search locating matches for words that might only be word-
fragments or misspelled words.
283 High Power Computer & Internet Tips and Tricks
hidden text text on a Web page that is invisible to the human eye but can be
detected by search engine spiders. This is accomplished by making the
text the same color as the page background. The use of hidden text is
sometimes used for spamdexing. see spamdexing.
meta tag HTML information that describes the contents of a Web page.
Meta tags include important keywords designed to be found by search
engine software.
phrase search a search for information that contains the exact phrase or
sentence as determined by the user.
relevancy refers to the precision with which a search engine located the de-
sired information, as determined by the user.
The User Friendly Guide to Internet & Computer Terms 284
search engine in reality, the software used to search and return matches to
search words and phrases. Methods vary, but the primary means of data
retrieval are the spider or crawler, and the index or catalog. The term is
often associated with a particular Website specializing in locating infor-
mation.
spider a program that searches for information online using the millions of
existing hyperlinks to “crawl” over documents related to the search.
stemming refers to a search that considers the root of a word. For example,
a search for the word “stemming” would also include the word stem.
stop words articles, conjunctions, prepositions, and words that would other-
wise have little relevancy to the true keyword. Stop words are included in
a full text search. Stop words would include a, an, and, as, the, etc.
submission service a business that will submit Web pages to various search
engines. This can be done automatically using robot software, or manu-
ally. There are fee-for-service submission services as well as those per-
forming the work free.
Cut Ctrl + X
Paste Ctrl + V
Undo Ctrl + Z
Refresh F5
Undo Ctrl + Z
Refresh F5
Undo Ctrl + Z
Turn Mouse keys On/Off (left) Alt + Left shift + Num Lock
Turn High Contrast On/Off (left) Alt + Left shift + Print Scrn
Metric Prefixes
yotta- x1,000,000,000,000,000,000,000,000
zetta- x1,000,000,000,000,000,000,000
exa- x1,000,000,000,000,000,000
peta- x1,000,000,000,000,000
tera- (T) x1,000,000,000,000
giga- (G) x1,000,000,000
mega- (M) x1,000,000
kilo- (K) x1,000
hecta- x100
deca- x10
200 PLUS
COOL WEBSITES
Universal power of Shee? Exactly where did Kolano come from and what
influence did he have on the people of his day? Kokobono has been called
“the Forrest Gump of all eternity.” Visit Kokobono.com and learn why.
have the time to search out your own Web goodies, let the pros at eTours do
all the work. There’s nothing to download, so sign up today.
15. www.iBeauty.com As the song says, You’re only pretty as you feel.
iBeauty has the resources to help you achieve your absolute best. Learn
about skin care, hair, hands and feet, bath and body, beauty accessories and
tools, and much more. Got a question about fragrances for men? iBeauty.com
probably has an answer. One particularly valuable feature of this site is the
“Ask the Experts” section. Here, experts on dermatology, cosmetic dentistry,
plastic surgery, hair, podiatry, and orthopedics answer visitor questions in the
field of their expertise. Another great section is “Ask Shirley.” Visitors to the
site can email questions about beauty, skin care, hair, and more, and receive
detailed answers, often with links offering tips and suggestions from the lead-
ing experts. Of course, you’ll want to do a little shopping before leaving to
take advantage of some of the great deals on featured health and beauty
products.
a wedding you probably know how many tiny details need your attention. This
site is designed to help. What about the flowers? Use their Floral Chart.
Wondering what to say for your toast? Try the Wedding Toast Generator.
Worried about the ever-increasing expenses? Take a look at the Wedding
Budget Planner. It’s simple. BlissEzine has thought of everything. Log on and
get some great ideas that will help make that special day even more special.
Whatever it is you need to plan your wedding, from food to fashion, you’ll find
it at this wonderful site.
26. http://www.wowa.org Did you know that teachers and students get
massive discounts on computer software? It’s true. This site specializes in
providing students, teachers, and accredited learning institutions with high quality
software at the lowest discounted price anywhere. WOWA.org carries com-
plete lines of software products from Microsoft, Adobe, Corel, Macromedia,
Autodesk, Borland and many other publishers who have such academic plans.
Not a teacher or student? Feeling left out? Don’t. They also carry other non-
academic retail software products including learning and training books, vid-
eos, and interactive multimedia CD-ROMs.
31. http://www.AnglerWorld.com “You should have seen the one that got
away.” If you’ve ever spoken those words in earnest, then the folks at
AnglerWorld.com understand you. This is a great site for the fishing buff. Are
you into salt water or surf fishing? They’ve got you covered. Rather seek out
those huge bass or wily salmon? No problem. This is a great place to network
with other fishermen. They support message boards so you can discuss fish-
ing gear, your favorite fishing hole, boats and motors, fishing strategies and
more. Looking for a boat? You’ll want to stop by the “Boats for Sale” section.
Whatever your fishing passion might be from tuna to trout, you owe it to
yourself to investigate AnglerWorld.com.
cept for the Tough Man contest was taken from the movie “Tough Enough”
starring Dennis Quaid and Pam Grier. To see photos of recent events and
learn more, log on. No Wimps!
to have to learn the hard way. Of course, all of the associated grief can easily
be avoided by using one of the leading antivirus programs available anywhere.
McAfee.com offers the most up-to-date virus protection with free updates
for a full year. The Website is loaded with information on what bugs are out
there, and how to avoid them, along with tons of useful information about
computers and software. Don’t be caught unprepared.
1960s TV show Family Affair and she’s recently been re-introduced to the
world. Dollpage.com is loaded with interesting news as well as a Fun Stuff
section, a page devoted to Doll Talk, a chat room especially for doll lovers,
articles and interviews from your favorite doll experts, a bookstore, and infor-
mation on how to spruce up an ailing Barbie. There’s also a directory so you
can check on doll shows coming to your area.
person still alive? This site will help you to find out. Who’s Dead and Who’s
Alive lists actors and actresses, musical performers, athletes and sports per-
sonalities, and political figures. There’s a section listing famous people who
have recently passed on and one for celebrity birthdays. When you’ve got to
know, you’ve got to know.
your Web visits with Discovery television. Perhaps the best all around educa-
tional Website out there! This one’s a keeper.
Hogwarts Bulletin Board, FanArt, FanFiction, book covers, articles, and find
out what’s new with Harry. Experts say that the Harry Potter phenomenon is
good because these great books are helping to renew an interest in reading
among school-age children. While you’re visiting, check out a few of the
Harry Potter objects like Rowena’s Eagle Pendant and an official spell book.
This site, by the way, is run totally by fans.
Japanese, books, anime, DVDs, videos, electronics, software and much more.
Find out what an English word looks like in Japanese. While you’re there you
can even download free illustrated electronic books. This site is loaded with
cool stuff.
Freebies
82. http://www.Pagoo.com If there’s one thing just about everyone likes,
it’s free stuff. If you’re like the rest of us, you’re going to love this site. Pagoo
offers unlimited FREE long distance phone calls while online. If that isn’t
enough, how about, free call forwarding while your offline? Want more? Try
free voicemail and Caller ID. This won’t last forever. It’s available during
The User Friendly Guide to Internet & Computer Terms 312
Pagoo’s Preview Release. Don’t be late for this one. No credit card required,
and no changes to your current phone service. Hurry and sign up!
bies. It’s an easy download, or you can order a CD. Everyone agrees the
Internet is cool, but free Internet...
ents can show off their little one to everyone they’ve invited through a private
netcast.
Web Essentials
106. http://www.indo.com/distance Like interesting trivia? Need to settle
an argument? Planning a trip? Sometimes the simplest Websites are the best,
and the most useful too. Log onto Indo.com/distance to instantly find out the
distance between any two cities in the United States. This simple Web page
allows you to type your destinations into simple address fields and instantly
returns the distance as the crow flies. Need highway mileage? The site also
provides links to maps to help with trip plans. While you’re there don’t forget
to visit the hosting page for a wonderful slice of the continent of India.
114. http://www.iPing.com Can’t recall where it was you put your Mega
Memory tapes? Well, iPing.com can’t help you there, but if it’s a birthday,
anniversary, or another important date you’ll need to be reminded about, they
can help with that. You’ll need to sign up and get a username and password to
get started with this free service. Then it’s as simple as letting Iping.com
know about those special dates. They’ll notify you by telephone, cell phone, or
pager. They also offer services like Mr. Dollar, which is an hourly financial
update from the Wall Street Journal, Mr. Dose, Ms. FollowUp, and several
other cool services.
the premiere ride sharing board on the Web and it’s simple to use. Whether
you’re in need of transportation or are willing to take someone along with you,
you simply log onto the site and post your intentions. Transportation isn’t just
limited to the US though, you can share travel anywhere in the world. To take
advantage of this great service, check the site for all the details.
125. http://WinFiles.com Even with the best books out there to guide you
along, Windows can still be a confusing operating system. WinFiles.com can
The User Friendly Guide to Internet & Computer Terms 322
help you in a pinch. This award-winning site provides information and links to
finding Windows compatible hardware, software, technical support, software
reviews, tricks, tips and fixes, Windows drivers, shareware and Virtual serv-
ers. If you’re running any version of Windows, this site belongs in your Book-
mark file.
flow statements and balance sheets, this site offers information you’d prob-
ably never think to include in your plan. They outline points you’ll want to
cover in your business and marketing plan as well as explaining how to con-
duct effective product analysis. Whether you’re just starting in business or a
seasoned pro, this site has something for you.
carbohydrates, etc. in the food from all of your favorite fast food joints. You’ll
find easy instructions for getting the most from the site, along with links for
books and other products related to nutrition.
Fun Stuff
fans that publish this cool site can help you to take a trip down memory lane,
or should I say memory lagoon? On this very well done site you’ll hear more
than 20 different renditions of the theme song, experience tons of memora-
bilia, and take notice of the show’s strange similarities to the hit TV show,
Survivor.
Kids Stuff
169. http://www.AtoZkidsStuff.com There’s something for everyone on
the Web and kids are no exception. AtoZkidsStuff.com is a Website designed
with the pre-school to school-aged child in mind. Health and safety issues are
important here as the site features articles and news on recalled products, tips
on avoiding bullies, violence on TV, Growing up on the Bright Side, reading,
and more. Kids can also create and send digital postcards to friends. There’s
a section with suggested activities for special days, rainy days, freebies for
kids, and fun activities. Do your kids like to play with sculpting dough? Afraid
they’ll eat some? You’ll love the recipe for Peanut Butter Playdough. Help
your kids learn what a useful tool the computer can be. This informative and
fun site can help.
333 200 Plus Cool Websites
or access the MadSci Library to help you locate resources on the Web. This
is a great site for research and homework.
Entertainment
179. http://www.ShowbizData.com Looking for all the inside news on the
movie business? This isn’t the stuff you’ll see on the front page of the Living
Section of your local newspaper. Showbizdata.com is your news source for
the movie industry. The site lists the top grossing movies, new video releases,
a hot show business events calendar, a really hot “movie” search engine, and
industry job openings. Wondering if you should bother seeing that latest flick
you’re hearing so much about? Check out ShowbizData’s extensive movie
review and rating section. If you’d like to dig really deep into the Hollywood
scene, they also offer a subscriber service.
were two of the more notable ones. bMonster.com has made a study of the
low-budget monster movie. They offer extensive summaries and comments
on many old horror, science fiction, and cult movies. Wondering about that
flick that scared you half to death back in 1961? Look it up in their search
directory. Interesting facts about the producers, directors and players in these
forgotten flicks, makes this a site you could spend hours visiting.
of his hit movies and more. Did you know the comic also wrote and recorded
music? Find out all you need to know about Adam such as upcoming movie
projects and release dates, new music and more on this funny and informative
site.
188. http://www.bbhq.com Were you born between the years 1946 and 1964?
Maybe you’re right on the line in either direction. If so, you’re a baby boomer.
What does that mean? At Baby Boomer Head Quarters, a lot. The site has an
extensive music section with features like Who Sang That Song, Ask the DJ,
the Music Library, and the Boomer Top 10. There’s a section on the 60’s with
a sixties quiz, boomer stats, Woodstock, and “When I was a kid.” Check out
the 70’s for the 70’s Story, the 70’s Quiz and much more.
Buy a Thrill,” their groundbreaking first album. Find out about various band
members of the past, check out their tour schedule, read reviews of their
music both past and present, get the lyrics to all of their songs, leave a mes-
sage, and more. The music of Steely Dan transcends time.
PayPal is an inexpensive alternative. Log onto the site, select “Open a Busi-
ness Account,” fill out a short form, and you’ll be accepting payments online
in no time. This is also a great service for making payments online.
over the past 25 years? Check the Historical Charts and Data Section.
Kitco.com is the most useful site for precious metals we’ve discovered on the
Web.
area. Use their IRA calculator, compare funds, research a broker and much
more. MorningStar.com is a very comprehensive collection of investment tools.
Charles lives on a small ranch in the Puget Sound area of the state of
Washington. He is actively involved in managing rental real estate, gives semi-
nars on investments, finance, Web marketing, and manages several dynamic
Websites. He is available as a consultant for copywriting, Web design, Web
hosting and Internet marketing. To contact him by email, drop a note to
“webmaster” at http://www.WebBizCentral.com, or call 1-800-598-7996.
The User Friendly Guide to Internet & Computer Terms 344
Order Form
Name __________________________________________
Address ________________________________________