Friday, April 14, 2017

Internet Cookies

There is more to Internet Cookies than meets the eye. The name itself is so confusing and does not reveal at once its true nature and characteristic. It is like many of the computer words that came out since the computer age. English words are borrowed by those who build computer hardware and software to name and identify computer components or software functions. These English words becomes jargon and as what normally happens to a jargon it takes on a new meaning. So, to straighten it up then, a cookie is a text based or simply characters that a Web server stores on a user's hard disk.


According to Marshall Brain this piece of text are stored as name-value pairs. A name-value pair in most cases is composed of two parts and they are: 1) user ID; and 2) information pertaining to this user ID. This name-value pair is not a program. It does not look like a program and it does not have the capability of even the most simple program that could ever be designed. It cannot self-execute even using the most simple security settings as found in Microsoft Windows. Thus there is no need to fear using cookies edta titration of ca2+and mg2+ in natural waters lab report.

This unfounded fear of Internet cookies must be dealt with or else the Internet particularly on line transactions such as shopping, getting weather information customized for local consumers, paying bills could be a very complex and time consuming activity. The ID that a cookie generates in a person's computer is a kind of identification that allows the server or the company to immediately identify the user. On the other hand, businesses loves the efficiency and ease of use that cookies bring to their operations.

The cookies placed by their server on the person's computer allow them to know if a new customer was added to their list of clientele and a whole lot more. Yet if security is still an issue then modern operating systems allow the user to customize cookie setting like for example the Microsoft Internet Explorer 6 software, to protect the user.

No comments:

Post a Comment