Xelon Blog | Xelon AG

Javascript, IPv4, Dedicated Server - Lara explains the IT world | Xelon AG

Written by Lara Schärer | Jan 14, 2020 9:35:00 AM

For the start of the new year there are 5 new IT terms that I would like to explain to you. Namely JavaScript, Bit, IP, Dedicated Server and Trojan. Have fun!

JavaScript

JavaScript is one of many programming languages. But what is a programming language? Quite simply, for a computer or processor to execute certain commands, the command must be written in a programming language. JavaScript is suitable for creating various commands in web development. For example, to check form fields (telephone number, e-mail address, etc.).

Bit

A computer uses so-called binary codes, which consist of bits. These bits always have either the state 0 or 1. To form the letter A, for example, the following bits are strung together: 01000001. But what does this mean exactly? A bit is also a memory unit. More precisely, it is the smallest memory unit in electronic data processing. The next larger unit would be a byte. To obtain 1 byte, 8 bits are strung together (see example with letter). This is followed by kilobyte, megabyte and gigabyte.

IPv4

IP is the abbreviation for Internet Protocol, where v4 stands for version 4. Every computer has an IP, which is comparable to a house number. For example, if you want to access a server, the computer needs to know exactly where this server is located. Therefore the "house number" is needed. An IPv4 address consists of 4 parts with the number range 0-255.

Dedicated Server

The translation in German means something like "assigned server". This means that the entire resources of a server are available to a single client. This is also a physical server and not a virtual server.

Trojan

A Trojan horse is also called a Trojan horse. Why horse? Because the Trojan horse was used in Greek mythology to camouflage attacks. Technically speaking, a Trojan horse is a malicious computer program that is disguised as a conventional program and pretends to function normally on the outside. After installing the supposed program, your computer is misused by the attacker for this purpose.

All right, or do you just have a term for IT that you just don't understand? Then just send us a mail to contact@xelon.ch and we will explain the term in detail in the next blog.