Two-Factor Authentication
Two-factor authentication (2FA), is an enhanced security mechanism that requires a computer user to have not just one, but two items in order to authenticate (sign-in). The first item is something you know, such as your typical password. The second item is something you have, such as a physical cell phone that an access code
Web Browser
A web browser is a software program used to process and display web pages located on the World Wide Web (WWW) using the Hypertext Transfer Protocol (HTTP). Web page content most commonly includes text, graphics, multimedia files such as video and audio, and interactive software (web email, banking etc.). Web pages often have hyperlinks that
Big Data
Big Data is a term used to describe very large, vast and complex data sets. Such data sets are so large that they cannot be contained in a traditional database on a single computer, but rather are managed and stored across multiple systems in a distributed database computing environment. Some examples include the Google search
JPEG/JPG
JPEG or JPG for short is an image file format that stands for “Joint Photographic Experts Group”, the name of the committee that developed it. It is a very popular file type used by digital cameras and seen throughout the world wide web. JPEG files use what is known as lossy compression, a method of
Cookie
A cookie is a small data file that a remote website will place on your computer in order to remember you and your settings (session state) when revisiting at a future point in time. A common example of this would be a cookie placed by an email web page so that when you close the