Web Hosting Glossary

#a b cd e f g h i j k l m n o p qr s t u v w x y z
Web Hosting Glossary "c"
  • C++ - C++ is an object-oriented programming (OOP) language that is viewed by many as the best language for creating large-scale applications. C++ is a superset of the C language.  
    Top

  • Cable Modem - A modem designed to operate over cable TV lines. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines, a cable modem can be used to achieve extremely fast access to the Internet.  
    Top

  • Cache - A memory area where frequently accessed data can be stored for rapid access. 
    Top

  • Calendars - A calendar is a system for naming periods of time, typically days. These names are known as calendar dates. 
    Top

  • CDF - (Channel Definition Format) An XML-based file format, developed by Microsoft, for the description of channel information.  
    Top

  • Certificate - A document attesting to the truth of certain stated facts. 
    Top

  • Certificate Authority - An issuer of Security Certificates used in SSL connections.  
    Top

  • CGI - (Common Gateway Interface) CGI stands for Common Gateway Interface. CGI allows HTML pages to interact with programming applications.  
    Top

  • CGI Scripts - CGI "scripts" are just scripts which use CGI. These scripts are usually written in PERL or C++ and are usually placed in the web directory and called through a form. CGI scripts link the server and a program running on the system; for example, CGI scripts are used with interactive forms.  
    Top

  • cgi-bin - A directory that contains CGI programs. Websites must have a CGI-BIN in order to run CGI programs.  
    Top

  • CHAP - In computing, the Challenge-Handshake Authentication Protocol (CHAP) is an authentication protocol used to log on a user to an Internet access provider.  
    Top

  • Chat Room - An area online where you can chat with other members in real-time.
    Top

  • Click Through - The process of clicking on a link in a search engine output page to visit an indexed site.  
    Top

  • Client - A computer program or terminal that requests information or services from another computer (a server) on the network.  
    Top

  • Clip Art - A collection of images you can use in various documents. Clip art is often distributed on CD-ROM in large collections (thousands of clip art pieces) organized into categories, or available on the World Wide Web.  
    Top

  • Clustering - Connecting two or more computers together in such a way that they behave like a single computer. Clustering is used for parallel processing, for load balancing and for fault tolerance.  
    Top

  • CNAME - (Canonical Name) A Canonical Name is something of a fiction because many servers have more then one equally valid name. Basically, any domain name that has an A record.  
    Top

  • Co-Location - Refers to a relationship where the owner of a server would have their machine physically located at another organization's dedicated facility that is connected to the Internet.  
    Top

  • Cold Fusion - Cold Fusion is a scripting language for web designers that want wish to do advanced development and/or database interfacing. Cold Fusion supports MS Access, dBase, FoxPro, and Paradox databases. See official website.
    Top

  • Contact - A person who is in a position to give you special assistance; contact refers to the meeting with that person. Contact may be physically or by mail or email or by phone.  
    Top

  • Contact Record - In the case of many registries, contact information for technical, billing and administrative purposes are maintained in their database. It is important to keep your contact records updated to ensure that billing and renewal can proceed without problems.  
    Top

  • Control Panels - A program which allows you to change or access your administrative options within its user interface. Most popular are Plesk and cPanel.
    Top

  • Cookie - Small data files written to a user's hard drive by a web server. These files contain specific information that identifies users (e.g., passwords and lists of pages visited).  
    Top

  • Copy/Paste - A command on the Edit menu that adds data (text or pictures) to the clipboard, while leaving the original data unchanged. Used often with the ‘paste’ command. And paste Pastes the contents of the clipboard at the current cursor location.  
    Top

  • Counter - In general, a counter is a device which stores (and sometimes displays) the number of times a particular event or process has occurred often in relationship to a clock.  
    Top

  • Country Code - Each country has its own set of procedures and rules for ISDN. The Country Code is used to identify where the router will be installed so that this information can be included in the ISDN call setup information every time you make a call. 
    Top

  • Crawler - Is software that scans the Web and locates pages to add to the index of a search engine. A crawler is in the "robot" software classification.  
    Top

  • Cryptography - The conversion of data into a secret code for protection of privacy using a specific algorithm and a secret key. The original text, or “plaintext”, is converted into a coded equivalent called “cipher text” via an encryption algorithm. The cipher text can only be decoded (decrypted) using a predefined secret key. 
    Top

  • CSS - (Cascading Style Sheets) A Cascading Style Sheet (CSS) provides the ability to separate the layout and styles of a web page from the data or information. Styles such as fonts, font sizes, margins, can be specified in one place.  
    Top

  • Custom Error Pages - A custom error page is a feature of most Web server software that allows you to replace default error messages with ones you create. The default error messages tend to be fairly generic, and not particularly user-friendly, so making custom messages for your site is recommended.  
    Top

  • Cyber Cash - Another name for electronic cash, or a means of transferring funds online. This practice is expected to become widespread soon.  
    Top

  • Cyberpunk - It is also called a hacker and is a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.  
    Top

  • Cyberspace - Cyberspace is currently used to describe the whole range of information resources available through computer networks.  
    Top