Skip over navigation bars to content (Access key: x)Go to left navigation (Access key: y)Canada Customs and Revenue Agency Government of Canada

Glossary

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z



Back to top

- A -

Authentication

Authentication protects information by verifying the identity of the parties on both ends of the Internet connection, before confidential information is exchanged. Your Web access code and Business Number are positively identified at the time of log-in.

Throughout a session, extensive measures maintain security. In addition, server authentication ensures that you're communicating directly with the CCRA and not with an unauthorized party.

Back to top

- B -

Bookmark

In a Web browser–such as Microsoft Internet Explorer or Netscape Navigator–a bookmark (or "Favourite") is a way to save the current link, so that you won't have to type in the complete address the next time you want to visit the same site.

Browser

This type of software lets users browse through the World Wide Web. Netscape Navigator and Microsoft Internet Explorer are the most well-known browsers.

Back to top

- C -

Cache

Your cache stores information where it can be accessed quickly. Your Web browser stores pages, sounds, URLs, and images in caches where they can be easily retrieved. As the user backs through the links, the pages are retrieved quickly, saving the time of a reload.

CCRA

On November 1, 1999, Revenue Canada became the Canada Customs and Revenue Agency (CCRA).

Cookie

A cookie is a small information file that's transferred from a Web server to your Web browser to be stored and accessed on your computer. There are several types of cookies that are used for many different reasons, depending on the Web site you're visiting. One of the most common reasons for a Web site to send you cookies is to remember who you are and your preferences for certain kinds of information. Only the site that sends you cookies is able to read them.

Back to top

- D -

Download

You copy a file from a host system to your computer. There are several different methods, or protocols, for downloading files.Most of them periodically check the file as it's being copied to ensure that no information is inadvertently destroyed or damaged during the process.

Back to top

- E -

Encryption

Encryption is used to ensure that an unauthorized party won't access your personal information. Data you send from your computer is encrypted before leaving it. Encryption alters your data into a format that can be safely transmitted over the Internet. Once the data has been encrypted, it cannot be read until it reaches its destination and is decrypted, using a decryption key.

Back to top

- F -

Firewall

A firewall acts as a barrier between internal and external computers in a network, controlling the flow of information between the two. When a computer outside the firewall wishes to communicate with a computer inside, it must communicate with the firewall, which then passes the data to the internal computer. This two-step process protects the CCRA's internal network from unauthorized access.

Back to top

- J -

JavaScript

JavaScript is a scripting language which works primarily on Web pages and is used frequently to: add visual functions such as alert boxes and pop-up windows, create animations, as well as detect browser, browser version, and platform.

Java applets

Java applets are little applications which work primarily on Web pages and Web servers and are used frequently to perform specialized tasks.

Java application

A downloadable Java application allows clients, on their computer, to create, print, save, and submit an electronic information return.

Java Runtime Environment (JRE)

The Java Runtime Environment lets your computer run Java applications.

Back to top

- M -

Modem

A combined form of modulator-demodulator, a modem is a device that allows computers to transmit data over telephone lines.

Back to top

- P -

Packet

Whenever information is sent over the Internet, it is divided into smaller multiple parts or packets to make transmission easier. These packets of information are then reassembled when they reach their destination.

PKI

An acronym for Public Key Infrastructure, PKI involves certificates being held by each party transmitting over the Internet. PKI is not required for Internet filing.

Back to top

- S -

SSL (Secure Sockets Layer)

SSL protocol was developed by Netscape Communications Corporation to secure Internet communications by encrypting sessions between your Web browser and a Web server. When sensitive information is being sent over the Internet between your browser and a Web server, SSL verifies that the information has not been altered in any way en route. All major browsers released in recent years support SSL.

Back to top

- U -

URL

This initialism for "universal resource locator" – refers to an address on the World Wide Web. For example, www.ccra-adrc.gc.ca. You need a browser like Internet Explorer or Netscape Navigator to read the information.



More Ways to Serve You!

Updated: 2002-06-03 Back to top Important notices