Sei sulla pagina 1di 17

9 reasons why your business NEEDS a professional website!

Like many small business owners, you may believe your business cannot benefit from having a website or that a website is not within your budget. Or maybe you think because you dont use a computer, neither do your potential customers. These are misconceptions. These 9 reasons show why your company NEEDS a professional website, no matter what size your business. Due to affordable cost offered by Webmirchi now everyone can have their Business Website.

1. YOUR SMALL BUSINESS WILL GAIN CREDIBILITY


Today, more and more consumers use the internet to search for the products or services they need. Your small business will gain credibility by having a website. Without one, potential customers will go to your competitors that do. If you already have a website but it is "home-made", having it professionally redesigned will provide your business with a professional image which will inspire even greater confidence. For home-based businesses, this is particularly beneficial since you do not have a store front to promote your products or services.

2. A WEBSITE SAVES YOU MONEY


As a small business owner you probably think you can't afford a professional website, but you can't afford NOT to. Although the cost of designing a website varies, once it's up and running, a website for a small business generally costs under Rs 400/-. a month and, in some cases, as little as Rs.250/-. Compared with the cost of a newspaper ad, when you consider the potential market you can reach with a website, it is a very cost effective way to promote your business.

3. IT WILL ENABLE YOU TO KEEP YOUR CUSTOMERS INFORMED


Think of your website as being your online brochure or catalogue. It is much easier and quicker to update information about your products and services on your website than in print material, making it an effective way of letting your customers know about the arrival of new products, upcoming events, special promotions, or any new services you now offer. Unlike print ads which quickly become outdated, your website can provide current information and news.

4. IT IS ALWAYS ACCESSIBLE
A website is available to both your regular and potential customers 24/7/365 providing them with the convenience of reviewing your products and services when your store or office is closed. With todays busy lifestyles, this is a great selling point when making a purchase decision.

5. A WEBSITE MAKES IT POSSIBLE TO TARGET A WIDER MARKET


Whether you provide products or services, your website will provide an alternative location to sell them. As a retailer, a website (eCommerce) is a great place to sell your products to a wider market; even services can be made available globally. Don't think you'll be able to sell your products or services online? Don't forget, even cars and houses sell online!
Page No : 1

6. IT PROVIDES A MEDIUM ON WHICH TO SHOWCASE YOUR WORK


No matter what type of business youre in, a website is a great place to showcase your work. By including a portfolio or image gallery, as well as testimonials about your work, you can demonstrate what makes your business unique.

7. A WEBSITE SAVES YOU TIME


Providing information to your customers takes time, whether its on the phone, face-to-face, in a brochure, or in emails. With an online catalogue you can provide lots of information about your products and services. Once your website is up and running, it is available to your customers indefinitely, saving you time. And what is time? Time is money!

8. IT IMPROVES CUSTOMER SERVICE


Maybe you sell environmentally friendly products and would like to share tips on how to recycle, or perhaps youre an accountant and want to give your clients advice on how to simplify their bookkeeping practices. By including a FAQ page, adding articles or uploading newsletters to answer all your customers' questions you can keep them up-to-date. What better way to provide them with value added service than by sharing information on your website.

9. MOST IMPORTANT IS IT HELPS TO GET MORE CUSTOMERS IN SHORT PERIOD.

. . . . General Internet & Website Terms . . . .


4G
In telecommunications, 4 is the fourth generation of mobile phone mobile communication technology standards. It is a successor of the third generation (3G) standards. A 4G system provides mobile ultra-broadband Internet access, for example to laptops with USB wireless modems, to smartphones, and to other mobile devices. Conceivable applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, 3D television and Cloud Computing. .... A....

ASP.NET
ASP.NET is a server-side Web application framework designed for Web development to produce dynamic Web pages. It was developed by Microsoft to allow programmers to build dynamic web sites, web applications and web services. It was first released in January 2002 with version 1.0 of the .NET Framework, and is the successor to Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on the Common Language Runtime (CLR), allowing programmers to write ASP.NET code using any supported .NET language.

Page No : 2

Archives and Archiving


A computer 'archive' is one of two things: a compressed container of multiple smaller data files, or a purposeful long-term storage of files that are not going to be used often. In some cases, an archive can be both. The act of 'archiving', similarly, is one of two things: to combine and squeeze multiple files into a larger single file (for easier emailing); or, archiving is when you will retire data and documents to be put into long-term storage (e.g. your thousands of old emails in your inbox).

Apps and Applets


Apps and applets are small software applications. They are designed to be much smaller than regular computer software, but still provide very useful functions. Lately, apps are very popular with cellphone and mobile platforms; specifically: with the Apple iPhone and the Google Android phone. Examples of apps: rangefinder GPS for golfing, song identification software, restaurant reviews, pocket video games, language translators for traveling.

A Record
An entry in your DNS table (zone file) that maps each domain name (e.g. you.com) or subdomain (e.g. abc.you.com) to an IP Address. In other words, the A record specifies the IP address to which the user would be sent for each domain name. For example, you can have abc.you.com point to one IP address, and xyz.you.com point to a different IP address.

Addons and Plugins


Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web. Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.

Acrobat
A program from Adobe that stores images or documents originally designed for print medium, and allows you to view them on your computer without any corruption or distortion of the images. In order to view an Acrobat document, which is called a PDF file, you need the Acrobat Reader. The Reader is free and can be easily downloaded from Adobe website. ... B....

Bandwidth
Bandwidth describes the maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. For example, a gigabit Ethernet
Page No : 3

connection has a bandwidth of 1,000 Mbps, (125 megabytes per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth. While bandwidth is used to describe network speeds, it does not measure how fast bits of data move from one location to another. Since data packets travel over electronic or fiber-optic cables, the speed of each bit transferred is negligible. Instead, bandwidth measures how much data can flow through a specific connection at one time.

Blogs and Blogging


A blog ('web log') is a modern online writer's column. Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages. Web logs are usually arranged chronologically, and with less formality than a full website. Blogs vary in quality from very amateurish to very professional. It costs nothing to start your own personal blog.

Bookmark
A bookmark (aka "favorite") is a marker that you can place on web pages and files. You would bookmark something because: 1. You want to return to the page or file later 2. You want to recommend the page or file to someone else Bookmarks/Favorites can be made using your right mouse click menu, or the menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on your Mac or Windows computer files.

Browser
A program installed on your computer that enables you to access web pages on the World Wide Web. Browsers request web pages from servers. The most widely used browsers today are Google Chrome, Mozzila Firefox, Opera, Netscape Navigator and Microsofts Internet Explorer. .... C....

Cloud Computing and Software-as-a-Service (SaaS)


Cloud computing is a fancy term to describe that your software is online and 'borrowed', instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users' email is all stored and accessed 'in the cloud' of the Internet, and not actually on their own computers. As part of the cloud computing model, 'Software as a Service' is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet, and log into their online rented copies of their SaaS software.
Page No : 4

CRM
CRM is the abbreviation for customer relationship management. It entails all aspects of interaction that a company has with its customer, whether it is sales or service-related. CRM is often thought of as a business strategy that enables businesses to:

Understand the customer Retain customers through better customer experience Attract new customer Win new clients and contracts Increase profitably Decrease customer management costs

Cloud Server
A cloud server is a logical server that is built, hosted and delivered through a cloud computing platform over the Internet. Cloud servers possess and exhibit similar capabilities and functionality to a typical server but are accessed remotely from a cloud service provider. A cloud server may also be called a virtual server or virtual private sever.

Cookie
Small text files that web sites leave on your hard disk when you visit. These files store information about your web use, such as what sites you frequently visit and what pages in a site you go to. Each web site can only read the cookie it leaves. Generally cookies can be helpful, by remembering passwords and ID names from previous visits, so you dont have to. .... D....

Download
Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web. Commonly, downloading is associated with songs, music, and software files (e.g. "I want to download a new musical ringtone for my cell phone", "I want to download a trial copy of Microsoft Office 2012"). The larger the file you are copying, the longer the download will take to transfer to your computer. Some downloads will take 12 to 15 hours, depending on your Internet speed. Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music.

Dynamic Website
Dynamic websites contain Web pages that are generated in real-time. These pages include Web scripting code, such as PHP or ASP. When a dynamic page is accessed, the code within the page is parsed on the Web server and the resulting HTML is sent to the client's Web browser.
Page No : 5

Most large websites are dynamic, since they are easier to maintain than static websites. This is because static pages each contain unique content, meaning they must be manually opened, edited, and published whenever a change is made. Dynamic pages, on the other hand, access information from a database. Therefore, to alter the content of a dynamic page, the webmaster may only need to update a database record. This is especially helpful for large sites that contain hundreds or thousands of pages. It also makes it possible for multiple users to update the content of a website without editing the layout of the pages. Dynamic websites that access information from a database are also called database-driven websites.

Domain Name
Your organizations "www" address on the World Wide Web. Example: www.yourcompany.com

Domain Name Registrar


A domain name registrar is an organization or commercial entity that manages the reservation of Internet domain names. A domain name registrar must be accredited by a generic top-level domain (gTLD) registry and/or a country code top-level domain (ccTLD) registry. The management is done in accordance with the guidelines of the designated domain name registries and to offer such services to the public.

Domain Transfer
A domain name transfer is the process of changing the designated registrar of a domain name. ICANN has defined a Policy on Transfer of Registrations between Registrars

DPI
Dots per inch. Relates to the resolution, or sharpness and clarity of an image. An image with a high resolution has more dots per inch.

DSL
DSL is the latest technology bringing the Internet into your home or office. Using existing wiring, DSL connects at speeds equivalent to T1 connectivity. .... E....

Email
It's hard to remember what our lives were like without e-mail. Ranking up there with the Web as one of the most useful features of the Internet, e-mail has become one of today's standard means of communication. Billions of messages are sent each year. If you're like most people these days, you probably have more than one e-mail address. After all, the more addresses you have, the more sophisticated you look... E-mail is part of the standard TCP/IP set of protocols. Sending messages is typically done by SMTP (Simple Mail Transfer Protocol) and receiving messages is handled by POP3 (Post Office Protocol 3), or IMAP (Internet Message Access Protocol). IMAP is the newer protocol, allowing you to view and sort messages on the mail server, without downloading them to your hard drive. Though e-mail was originally developed for sending simple text messages, it has become more robust in the last few years. Now, HTML-based e-mail can use the same code as Web pages to incorporate formatted text, colors,
Page No : 6

and images into the message. Also, documents can be attached to e-mail messages, allowing files to be transfered via the e-mail protocol. However, since e-mail was not originally designed to handle large file transfers, transferring large documents (over 3 MB, for example) is not allowed by most mail servers. So remember to keep your attachments small!

E-commerce
E-commerce is 'electronic commerce': the transacting of business selling and buying online. Every day, billions of dollars exchange hands through the Internet and World Wide Web. Sometimes, the e-commerce is your company buying office products from another company (business-to-business 'B2B' e-commerce). Sometimes, the e-ecommerce is when you make a private purchase as a retail customer from an online vendor (business-toconsumer 'B2C' e-commerce). E-commerce works because reasonable privacy can be assured through technical means (e.g. https secure web pages), and because modern business values the Internet as a transaction medium.

Encryption and Authentication


Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas ('ciphers') to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the public Internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. On the provision that reliable encryption is in place, your banking information and credit card numbers are kept private. Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are.

Email
E-business: (electronic business) The conduct of business on the Internet, not only buying and selling but also servicing customers and collaborating with business partners. E-commerce (electronic commerce or EC): The buying and selling of goods and services on the Internet. In practice, this term and a newer term, e-business, are often used interchangeably. .... F....

Firewall
Firewall is a generic term to describe 'a barrier against destruction'. It comes from the building term of a protective wall to prevent the spreading of house fires or engine compartment fires. In the case of computing, 'firewall' means to have software and/or hardware protecting you from hackers and viruses. Computing firewalls range from small antivirus software packages, to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system.
Page No : 7

Flash Animation
The overarching purpose of Flash is to add excitement to static and boring web site design. Although you can still make sparkling web pages with images, HTML code, and a bit of hard work you can't really create efficient animations that intrigue and excite your visitor.

FTP
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead, but is technologically different. The first FTP client applications were command-line applications developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Dozens of FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into hundreds of productivity applications, such as Web page editors.

Frames
A feature that allows a web page to be displayed in multiple scrollable windows on the screen at once. The use of frames is discouraged because it hinders search engines from indexing pages within the site. ... H....

HTML and XML


Hypertext Markup Language is the programmatic language that web pages are based on. HTML commands your web browser to display text and graphics in orderly fashion. HTML uses commands called 'HTML tags' that look like the following:

<body></body> <a href="www.about.com"></a> <title></title>

XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following:

<entry> <address> <city>

XHTML is a combination of HTML and XML.


Page No : 8

Hits
A request for only one file from a server. When analyzing the success or popularity of your web site consider web visits not hits.

Home Page
The first page presented when you visit a web site. When you enter a web sites domain name, you are sent their home page.

http and https


http is a technical acronym that means 'hypertext transfer protocol', the language of web pages. When a web page has this prefix, then your links, text, and pictures should work in your web browser. https is 'hypertext transfer protocol SECURED'. This means that the web page has a special layer of encryption added to hide your personal information and passwords. Whenever you log into your online bank or your web email account, you should see https at the front of the page address. :// is the strange expression for 'this is a computer protocol'. We add these 3 characters in a Web address to denote which set of computer lanaguage rules affect the document you are viewing.

.... I.... ISP


ISP is Internet Service Provider. That is the private company or government organization that plugs you into the vast Internet around the world. Your ISP will offer varying services for varying prices: web page access, email, hosting your own web page, hosting your own blog, and so on. ISP's will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet). Example: Tata Indicom, Reliance Broadband Today, you will also hear about WISP's, which are Wireless Internet Service Providers. They cater to laptop users who travel regularly. Example: Tikona

Index
The searchable catalog of documents created by search engine software. Also called "catalog." Index is often used as a synonym for search engine. Index is commonly pluralized as "indices." However, Search Engine Watch instead uses the alternative plural form "indexes."

IP Address
Internet Protocol Address or IP address is a 32-bit number identifying a unique computer (host) location on the Internet (expressed either as a unique string of numbers or as its associated domain name)..
Page No : 9

I.M.
I.M. (usually spelled 'IM' without the periods) is instant messaging, a form of modern online chatting. IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer. That IM software in turn connects you to potentially thousands of other IM users through the Internet. You locate existing friends and make new friends by searching for their IM nicknames. Once the software and your friends list is in place, you can send instantaneous short messages to each other, with the option of including file attachments and links. While the recipient sees your message instantly, they can choose to reply at their leisure.

.... K.... Keywords and Tags/Labels


Keywords are search terms used to locate documents. Keywords are anywhere from one to five words long, separated by spaces or commas: e.g. "horseback riding calgary" e.g. "ipad purchasing advice" e.g. "ebay tips selling". Keywords are the foundation for cataloging the Web, and the primary means by which you and I will find anything on the Web. Tags (sometimes called 'labels') are recommendation keywords. Tags and labels focus on crosslinking you to related content... they are the modern evolution of 'suggestions for further reading'. .... M....

Malware
Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things: 1. 2. 3. 4. vandalize your computer in some way steal your private information take remote control of your computer ('zombie' your computer) for other ends manipulate you into purchasing something

Malware programs are the time bombs and wicked minions of dishonest programmers.

MX Record
A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

Page No : 10

.... N....

Name Server
Netiquette: Simply, etiquette on the Internet. Since the Internet changes rapidly, its netiquette does too, but it's still usually based on the Golden Rule. The need for a sense of netiquette arises mostly when sending or distributing e-mail, posting on Usenet groups, or chatting. .... O....

On-Line Community
A group of people that have common interests and needs, and are connected to one another via an on-line means such as the Internet. Users can customize the "virtual environment" to their own individual, unique interests, needs and location requirements.

Organic Search Engine Optimization


"Organic" or "Natural" search engine optimization (SEO) is accomplished by optimizing your web pages and by increasing your "link popularity" by acquiring or paying for links that point to your web site. Jointly these techniques give your site higher rankings in the search engines for your chosen search terms. .... P....

Ports and Port Forwarding


'Network ports' are thousands of tiny electronic 'lanes' that comprise your network connection. Every computer has 65,536 tiny ports, through which Internetworking data travels in and out. By using port management tools like a hardware router, users can control port access to better safeguard themselves against hackers. 'Port forwarding' is the semi-complex technique of opening specific network ports. You would port-forward to speed up your downloading and speed up your online connections for gaming and teleconferencing.

P2P
P2P file sharing ('peer-to-peer') is the most voluminous Internet activity today. P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other. Through 'uploading' and 'downloading', users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P. Example : Rapidshare & Torrent

Phishing and Whaling


'Phishing' is what modern-day men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens,
Page No : 11

phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says "you should login and confirm this".

Pixel
In digital imaging, a pixel, or pel, (picture element) is a physical point in a raster image, or the smallest addressable element in a display device; so it is the smallest controllable element of a picture represented on the screen. The address of a pixel corresponds to its physical coordinates. LCD pixels are manufactured in a twodimensional grid, and are often represented using dots or squares, but CRT pixels correspond to their timing mechanisms and sweep rates.

PDF (Portable Document Format)


A type of file that can store (on computer) the image of a printed document without distorting or corrupting that image. This allows you to view or print a document in its original form. In order to view and print PDF files, you need to first download the Acrobat Reader, which is free. Once you've downloaded the Reader, it will start automatically whenever you want to view a PDF file.

Phrase search
A search for documents containing a exact sentence or phrase specified by a user.

Portal
A World Wide Web site that acts as a major starting site for users when they get connected to the Web, a portal (A.K.A. gateway) enables users to search for sites on the Internet. Some major portals include Google, Yahoo, Excite, Netscape, Lycos, Northern Light, MSN, and America Online's AOL.com There are general portals and specialized or niche portals (also known as vortals, or vertical portals).

Precision
The degree in which a search engine lists documents matching a query. The more matching documents that are listed, the higher the precision. For example, if a search engine lists 80 documents found to match a query but only 20 of them contain the search words, then the precision would be 25%.

Proximity search
A search where users to specify that documents returned should have the words near each other. .... Q.... Query-By-Example: A search where a user instructs an engine to find more documents that are similar to a particular document. Also called "find similar." .... R....

Router (aka 'Network Router')


A router, or in many cases, a router-modem combination, is the hardware device that acts as the traffic cop for network signals into your home. A router can be wired or wireless or both. Your router provides both a defense against hackers, and the redirection service of deciding which specific computer or printer should get which
Page No : 12

signals in your home. If your router or router-modem is configured correctly, your Internet speed will be fast, and hackers will be locked out. If your router is poorly configured, you will experience network sluggishness and possible hacker intrusions.

RSS
A method of describing news or other Web content that is available for "feeding" (distribution or syndication) from an online publisher to Web users. RSS is an application of the Extensible Markup Language (XML) that adheres to the World Wide Web Consortium's Resource Description Framework. .... S....

Social Media and Social Bookmarking


Social media is the broad term for any online tool that enables users to interact with thousands of other users. Instant messaging and chatting are common forms of social media, as are blogs with comments, discussion forums, video-sharing and photo-sharing websites. Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and Digg.com. Social bookmarking is a the specific form of social media. Social bookmarking is where users interact by recommending websites to each other ('tagging sites').

Social Engineering
Social engineering is the conman art of talking directly to people to trick them into divulging passwords and their private information. All social engineering attacks are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards, bogus lottery winnings, stock investment scams, warnings from an alleged banker that you've been hacked, credit card companies pretending to protect you.

Spamming and Filtering


'Spam' has two meanings. 1) Spam can mean 'the rapid reptition of a keyboard command'. But more commonly, 2) spam is the jargon name of 'unwanted/unsolicited email'. Spam email is usually comprised of two subcategories: high-volume advertising, and hackers attempting to lure you into divulging your passwords. Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, andthen either deletes or quarantines messages that appear to be spam. Look for a 'spam' or 'junk' folder in your mailbox to see your quarantine of filtered email.

Search Engine
The software that searches an index and returns matches. Search engine is often used synonymously with spider and index, although these are separate components that work with the engine.

Page No : 13

Search engine optimization: (SEO) The practice of manipulating aspects of a web site to improve its ranking in search engines.

Spider
The software that scans documents and adds them to an index by following links. Spider is often used as a synonym for search engine.

Static Page
A web page with content that does not change unless the webmaster alters it. Each time a user visits a static page, they will see the same content. A static page is the opposite of a dynamically generated page. .... T....

Texting/Chatting
Texting is the short way to say 'text messaging', the sending of short electronic notes usually from a cell phone or handheld electronic device. Texting is popular with people who are mobile and away from their desk computers. Texting is something like the pagers of old, but has the file attachment ability of email. To send a text message, you will usually need a keyboard-enabled cellphone and a text message service through your cellphone provider. You address your text messages using the recipient's phone number.

Trojan
A trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. Sometimes it will be an innocent-looking movie file, or an installer that pretends to be actual anti-hacker software. The power of the trojan attack comes from users naively downloading and running the trojan file.

The Web vs. the Internet


The Internet is a vast 'interconnection of computer networks' that spans the globe. It is comprised of millions of computing devices that trade volumes of information. Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, and even soda pop machines are connected to the Net. The Internet started in the late 1960's as an American military project, and has since evolved into a massive public spiderweb. No single organization owns or controls the Internet. The Net has grown into a spectacular mishmash of non-profit, private sector, government, and entrepreneurial broadcasters. The Internet houses many layers of information, with each layer dedicated to a different kind of documentation. These different layers are called 'protocols'. The most popular protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and email. The World Wide Web, or 'Web' for short, is the most popular portion of the Internet. The Web is viewed through web browser software.
Page No : 14

Tables
An organized system of rows and columns on a web page in which elements, such as text or graphics can be placed. The alignment and measurements of tables can be specified down to the pixel.

Target Frame
The frame that contains the resulting web page when a hyperlink in another frame on the page is clicked.

Visits
The number of unique users who come to your web site and go to several different pages. Visits are a better indicator of a web sites "popularity" than hits. .... U....

URL
(Uniform Resource Locator, previously Universal Resource Locator) The unique address for a file that is accessible on the Internet. A common way to get to a web site is to enter the URL of its home page file in your Web browser's address line. Example : http://www.webmirchi.com

.... V....

VPS
A virtual private server (VPS) is one of many virtual machines running on a single computer.They are often used by Internet hosting services. Although a VPS runs in software on the same physical computer as other customers' virtual machines, it is in many respects functionally equivalent to a separate physical computer. A VPS is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software.

VOIP
Voice over IP (VoIP, abbreviation of voice over Internet Protocol) commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone.

Vortal
A web site that is a vertical portal or gateway to the Internet, enabling users to search for sites in one specific category such as gardening (garden.com), or investing (fool.com). Unlike general portals, such as Google, Yahoo, Altavista, and Excite, vortals focus on one particular niche interest or industry.

Page No : 15

.... W....

Webmaster
The person who creates and/or maintains a web site. You can usually find the webmasters logo or e-mail link at the bottom of the site's home page.

Web Hosting
In order to publish a website online, you need a Web host. The Web host stores all the pages of your website and makes them available to computers connected to the Internet. The domain name, such as "webmirchi.com," is actually linked to an IP address that points to a specific computer. When somebody enters your domain name into their browser's address field, the IP address is located and Web site is loaded from your Web host. A Web host can have anywhere from one to several thousand computers that run Web hosting software, such as Apache, OS X Server, or Windows Server. Most websites you see on the Web are accessed from a "shared host," which is a single computer that can host several hundred Web sites. Larger websites often use a "dedicated host," which is a single machine that hosts only one website. Sites with extremely high amounts of traffic, such as apple.com or microsoft.com, use several computers to host one site. If you want to publish your own website, you'll need to sign up for a "Web hosting service." Finding a good Web host shouldn't be too hard, since their are thousands available. Just make sure the Web host you choose offers good technical support and ensures little or no downtime. You'll usually have to pay a monthly fee that varies depending on how much disk space and bandwidth your site will use. So it's a good idea to estimate how big your site will be and how much traffic you expect before signing up for a Web hosting service.

Web Monitor
Website monitoring is the process of testing and verifying that end-users can interact with a website or web application. Website monitoring is often used by businesses to ensure that their sites are live and responding. Website monitoring companies that offer website performance monitoring allow businesses to simulate the actions of thousands of visitors to a website and observe how it responds. They also simulate visitors across multiple geographies and servers Internet connections. Performance monitoring tools send out alerts when pages or parts of a website malfunction, which allows the webmaster to correct issues faster.

Web Counter
A web counter or hit counter is a computer software program that indicates the number of visitors, or hits, a particular webpage has received. Once set up, these counters will be incremented by one every time the web page is accessed in a web browser. The number is usually displayed as an inline digital image or in plain text or on a physical counter such as a mechanical counter. Images may be presented in a variety of fonts, or styles; the classic example is the wheels of an odometer. The counter often is accompanied by the date it was set up or last reset, otherwise it becomes impossible to estimate within what time the number of page loads counted occurred.

Whois Lookup
This is an Internet service that finds information about a domain name or IP address. If you enter a domain name in a WHOIS search engine, it will scour a huge database of domains and return information about the one
Page No : 16

you entered. This information typically contains the name, address, and phone number of the administrative, billing, and technical contacts of the domain name. WHOIS can also be used to simply check if a certain domain name is available or if it has already been registered. To see the WHOIS service in action, check out Allwhois.com or BetterWhois.com.

Web Server
A computer that houses web sites. Servers "serve up" requests for web pages made by a computer's browser program like AOL, Internet Explorer, or Netscape. .... X....

XML
(Extensible Markup Language): A flexible way to create common information formats and share both the format and the data on the World Wide Web, intranets, and elsewhere. XML can be used by any individual or group of individuals or companies that wants to share information in a consistent way.

Types of Domain Name


Domain Registration Rs. 155/- onwards only : 1 Year ( Including Taxes )
.Pro 155/.Co.in 349/.In 479/.Com 539/.Org 233/.Net 399/-

Rates as on 20/04/2013

Different Hosting Platforms


Web Hosting Plan for Windows / Linux Servers : 1 Year ( Extra 10.03% Tax )
Plans 250 MB 500 MB 1 GB MB 2.5 GB 5 GB Windows 600/900/1650/3649/6599/Rates as on 20/04/2013 Linux 600/900/1650/3649/6599/Java on Windows 10499/10899/11649/13649/16599/Java on Linux 2499/2899/3649/5649/8599/-

Page No : 17

Potrebbero piacerti anche