Here’s a glossary of Internet terms and abbreviations, covering networking, web technologies, online services, protocols, security, and e-commerce.
🌐 INTERNET GLOSSARY
A
AJAX / Asynchronous JavaScript and XML – Technique for dynamic web page updates without full reloads.
API / Application Programming Interface – Allows applications to communicate over the internet.
ARP / Address Resolution Protocol – Resolves IP addresses to MAC addresses in local networks.
ARPANET / Advanced Research Projects Agency Network – Early precursor to the modern Internet.
Authentication / Identity Verification – Process of verifying a user or device online.
B
Bandwidth / Network Capacity – Maximum data rate of an internet connection.
Blog / Web Log – Online journal or informational website.
Bitrate / Data Transfer Speed – Amount of data transmitted per second.
Browser / Web Client – Software for accessing websites (e.g., Chrome, Firefox).
BGP / Border Gateway Protocol – Protocol for routing data between autonomous systems on the Internet.
C
Cache / Stored Data – Temporary storage of web content for faster loading.
CDN / Content Delivery Network – Distributed servers that deliver web content efficiently.
Cookie / Browser Data – Small file stored by websites to remember user preferences.
Cloud Computing / Internet-Based Services – Accessing software, storage, or processing over the internet.
Cryptography / Data Protection – Secures data transmission using encryption.
D
DNS / Domain Name System – Resolves human-readable domain names to IP addresses.
DoS / Denial of Service – Attack that makes an online service unavailable.
Domain / Web Address – Human-readable Internet address (e.g., example.com).
Download / Receiving Data – Transferring data from the internet to a local device.
DPI / Dots Per Inch (Digital Media) – Resolution for images and web graphics.
E
E-commerce / Online Business Transactions – Buying and selling goods/services online.
Email / Electronic Mail – Sending messages over the internet.
Encryption / Secure Communication – Protecting data so only authorized parties can read it.
Ethernet / Wired Network Technology – Common LAN networking standard for internet access.
Edge Computing / Local Data Processing – Processing data near the source instead of the cloud.
F
Firewall / Security System – Blocks unauthorized access to networks and computers.
Fiber Optic Internet / High-Speed Connection – Internet delivered via optical fibers using light pulses.
FTP / File Transfer Protocol – Standard for transferring files between computers over the internet.
Frontend / Client-Side Web Development – The part of a website users interact with.
Frame / Network Data Unit – Data packet encapsulation for internet transmission.
G
Gateway / Network Bridge – Connects different networks and translates protocols.
Gigabit / High-Speed Internet – Data transfer rate of 1 billion bits per second.
Google Analytics / Web Traffic Tracking Tool – Tool to monitor and analyze website traffic.
GIF / Graphics Interchange Format – Popular format for short, looping images.
Gopher / Early Internet Protocol – Predecessor to the World Wide Web for retrieving documents.
H
HTTP / Hypertext Transfer Protocol – Protocol for transferring web pages.
HTTPS / Secure HTTP – Encrypted web protocol using SSL/TLS.
Host / Web Server – Computer that stores and serves websites.
HTML / Hypertext Markup Language – Standard language for creating web pages.
Hub / Network Device – Connects multiple devices in a network.
I
IP / Internet Protocol – Addresses devices and routes packets over the internet.
ISP / Internet Service Provider – Company providing access to the internet.
IoT / Internet of Things – Network of connected devices communicating online.
IPV4 / Internet Protocol Version 4 – Most common IP address format (32-bit).
IPV6 / Internet Protocol Version 6 – Newer 128-bit IP addressing system.
J
JavaScript / Web Programming Language – Enables dynamic behavior on web pages.
JPEG / Image Format – Common format for compressed images online.
JSON / JavaScript Object Notation – Lightweight data interchange format.
Jitter / Packet Delay Variation – Variation in packet arrival times affecting streaming.
Jump Server / Secure Access Host – Server used to access devices on a network securely.
K
Keylogger / Monitoring Tool – Software or device that records keystrokes.
Kerberos / Authentication Protocol – Network security protocol for verifying identities.
Kbps / Kilobits Per Second – Measure of internet connection speed.
Keyword / Search Term – Term used in search engines for indexing or searching content.
Kit / Software Development Kit – Tools for creating applications for web or internet.
L
LAN / Local Area Network – Network connecting computers in a limited area.
Latency / Delay – Time it takes for data to travel from source to destination.
Link / Hyperlink or Network Connection – Connection between webpages or network devices.
Load Balancer / Traffic Distributor – Distributes incoming network traffic across servers.
Log File / Server Record – File recording internet activity or errors.
M
Modem / Modulator-Demodulator – Converts digital signals for transmission over internet lines.
Malware / Malicious Software – Software designed to harm computers or steal data.
Mesh Network / Peer-to-Peer Network – Network where devices relay traffic for each other.
Metadata / Data About Data – Information describing content, such as web pages or files.
Mirror Site / Replica Website – Duplicate of a website hosted at a different location.
N
Node / Device on a Network – Any device connected to a network.
Net Neutrality / Equal Internet Access – Principle that ISPs must treat all traffic equally.
Network Protocol / Communication Rules – Set of rules enabling devices to communicate.
NAT / Network Address Translation – Maps private IP addresses to public ones.
Newsletter / Email Subscription – Regular updates sent to subscribers via email.
O
Online / Connected to the Internet – Actively using internet services.
Offline / Disconnected – Not connected to the internet.
Open Source / Publicly Accessible Code – Software with freely available source code.
Overlay Network / Virtual Network Layer – Network built on top of another network.
OAuth / Authorization Framework – Allows secure third-party access to user accounts.
P
Ping / Connectivity Test – Checks if a device is reachable over a network.
Packet / Unit of Data – Small chunk of data transmitted over the internet.
Phishing / Online Fraud – Fraudulent attempts to acquire sensitive information.
Protocol / Rules for Communication – Defines how data is exchanged.
POP3 / Post Office Protocol – Standard for retrieving emails from servers.
Q
QoS / Quality of Service – Measures performance of internet services, including latency and throughput.
Query / Data Request – Request sent to retrieve information from a server or database.
Queue / Pending Data Transmission – Packets waiting to be sent over a network.
Quick Response / QR Code – Two-dimensional barcode linking to online content.
Quota / Data Usage Limit – Maximum allowed data usage for an internet connection.
R
Router / Network Device – Routes packets between networks.
RSS / Really Simple Syndication – Format for delivering regularly updated content.
Root / Administrator Access – Highest level of access to a system.
RTC / Real-Time Communication – Transmission of data in real-time (audio, video, chat).
Remote Access / Network Connection from Afar – Accessing a system or network remotely.
S
Server / Computer Serving Data – Provides services or resources over the internet.
SSL / Secure Sockets Layer – Encryption protocol for secure web communications.
SMTP / Simple Mail Transfer Protocol – Protocol for sending email.
Streaming / Continuous Data Transmission – Real-time delivery of audio/video content.
Subnet / Subdivision of Network – Segment of an IP network.
T
TCP / Transmission Control Protocol – Ensures reliable, ordered delivery of data.
TLS / Transport Layer Security – Encryption protocol for secure communications.
Top-Level Domain / TLD – Last segment of a domain name (e.g., .com, .org).
Traceroute / Path Diagnostic Tool – Shows route packets take to reach a server.
Token / Authentication Object – Digital key used for secure internet sessions.
U
URL / Uniform Resource Locator – Web address for resources.
UDP / User Datagram Protocol – Fast but unreliable data transmission protocol.
Upload / Sending Data – Transferring data from a local device to the internet.
User Agent / Browser Identification – Software identifying itself to servers.
Uptime / Availability – Time a server or website is operational.
V
VPN / Virtual Private Network – Secure tunnel for internet communications.
VoIP / Voice over Internet Protocol – Making phone calls over the internet.
Virtual Machine / VM – Emulated computer running on a host system.
VPS / Virtual Private Server – Virtual server for hosting websites or applications.
Virus / Malicious Code – Software that can replicate and harm devices over the internet.
W
Wi-Fi / Wireless Internet – Local wireless connectivity for devices.
Web Browser / Internet Client – Software for accessing websites.
Web Hosting / Site Storage – Service providing space for websites online.
WebRTC / Real-Time Web Communication – Browser-based audio/video/data communication.
Worm / Self-Replicating Malware – Malware that spreads across networks.
X
XSS / Cross-Site Scripting – Web security vulnerability allowing malicious scripts.
XML / Extensible Markup Language – Data format for structured internet communication.
XMPP / Messaging Protocol – Protocol for real-time messaging and presence.
XPath / XML Query Language – Language for querying XML documents.
XaaS / Anything as a Service – Cloud-based delivery of services via the internet.
Y
YouTube / Video Sharing Platform – Popular website for streaming and uploading videos.
Yottabyte / 10^24 Bytes – Extremely large measure of data storage or transfer.
Yield / Successful Transmission Rate – Percentage of packets transmitted successfully.
Yahoo / Web Portal – Early internet portal and search engine.
YAML / Data Serialization Format – Human-readable data format often used in web apps.
Z
Zero-Day / Security Vulnerability – Previously unknown exploit affecting systems.
Zoom / Video Conferencing Platform – Online service for meetings and webinars.
Zone / Network Segmentation – Logical network area for security or management.
Zigbee / Wireless IoT Protocol – Low-power communication standard for smart devices.
Zombie / Compromised Device – Device under control of a hacker, often in botnets.
Published 17th Feb. 2026