<Caption> - The <caption> tag defines a table caption.The <caption> tag must be inserted immediately after the <table> tag.for example:-

  <caption>CAPTION tag adds a caption to a table.</caption>

<Center> - <center>CENTER tags center text, images, etc.</center>.     

<Cite> - <cite>CITE tags defines a citation and displaying in italics.</cite>

<Code> - CODE tags are used for example, to indicate a code of the current <code>html tags.html</code> page.

<Col> - COL tags are used to define column properties for table columns.for example:-

<Colgroup> - COLGROUP tags are used to define groups of table columns.for example:-


    <colgroup span="2">
    <col width="60" align="left"></col>
    <col width="80" align="center"></col>
    <td>1st Column</td>
    <td>2nd Column</td>

Cache - This is a temporary storage area that houses frequently accessed data and keeps it ready for speedy access. This saves the computer from having to retrieve the information from main memory every time it’s required. In online terms, a cache can store much of a web page’s content instead of requesting all the data from the server again.

Cache busting - The process whereby a random number is added to a banner’s HTML each time the page is reloaded. This results in the server being sent a separate banner request every time and guarantees that the banner is not cached, and therefore that ad impressions remain accurate. AKA “defeating cache.”

Cached Out - To say that someone is “cached out” means that they are exhausted. This slang term in IT uses a play on words on the meaning of the word “cache” which is generally a memory reserve or repository.

Call 2 Recycle™ Program - A rechargeable battery recycling program, which is funded by the Rechargeable Battery Recycling Corporation (RBRC), that helps preserve the environment by keeping harmful by-products from rechargeable batteries out of landfills and the solid waste stream.

Call and Message Blocking - A service that allows you to prevent messages from being sent to or received by specific mobile numbers.

Call Detail - Information that pertains to the transmission of specific calls, including the time, location, duration and phone number called or received.

Call Extensions – Feature that enables users to display a Google forwarding or business phone number along with their PPC ad.

Call Forwarding - A feature that allows you to forward your mobile calls to another phone number, like your home or office number. Call Forwarding is included with all plans.

Call to action - A statement or instruction, typically promoted in print, web, TV, radio, on-portal, or other forms of media (often embedded in advertising), that explains to a mobile subscriber how to respond to an opt-in for a particular promotion or mobile initiative, which is typically followed by a Notice (see Notice).

Call Waiting - A feature that alerts you to an incoming call while you’re on a call and allows you to switch between the two calls.

Caller ID - A feature that displays the phone number of an incoming call on your phone’s screen.

Caller ID Blocking - A feature that allows you to block your number from being displayed on Caller ID equipment permanently or on a per-call basis. You can't block your number from appearing when calling certain numbers, such as 800 numbers and 911.

Caller Name ID - A feature that displays the caller’s name on your phone's screen when you receive an incoming call. If the caller’s name is listed in your phone's address book, then that name will be displayed.

Call-to-Action - A phrase, button, link or other site element that specifically asks a visitor to take some action, including purchasing a product, registering, subscribing or similar.

Camera Phone - A mobile phone with an embedded camera feature that can capture, send, store and save pictures.

Campaign – A set of ad groups (ads, keywords, and bids) that share a budget, location targeting, and other settings. Your Ad Words account can have one or many ad campaigns running.

Campaign weight - An integer weight value that provides a relative weighting of other campaigns.

Candy Bar Phone - A candy bar phone is one of several cell phone form factors in the mobile phone industry. A candy bar mobile phone is rectangular in shape with no lid or hinged enclosure, resembling a traditional candy bar.This term is also known as a slab, block or bar phone.

Canonical URL - The canonical meta tag that directs search engines to index the preferred URL for site content that is available from multiple URLs.

Canonicalization - The practice of selecting preferred URLs for a specific set of content. Many modern sites allow content to be accessed from a number of URLs, including URLs that may contain session or query information. Canonicalization helps to manage which of those URLs search engines index and credit.

Cappuccino  - Cappuccino is an open source application development framework for developing web applications that look and feel like desktop applications on Mac OS X. Cappuccino was developed by University of Southern California graduates Francisco Tolmasky, Tom Robinson and Ross Boucher, who are also the founders of 280 North, Inc. It is primarily targeted towards web ap

Captive Portal - In wireless networking, a captive portal is a process running on an AP that can intercept and redirect clients who have associated to a web page where they must agree to terms of service, provide a password, or even purchase access. These are common in hotels, airports, guest networks, and other locations that offer Internet access but want to charge a fee, restrict it to authorized users, or require the user to accept their AUP. See hotspot.

Capture - The act of converting the authorization amount into a billable transaction record. Transactions cannot be captured unless previously authorized, and authorizations should not be captured until the goods or services have been shipped or transmitted to the consumer.

Carebear - Carebear is a slang term that is used to refer to a video gamer who avoids violence and competition, or a video came that has very few violent elements. In the context of game design, a carebear is usually aimed at a younger audience. Carebear games tend to be exploratory in nature and rarely have play mechanics that can result in a character’s death. A carebear gamer, on the other hand, is someone who is not concerned with progressing through levels in an online game and instead chooses to inhabit safe zones and undertake non-competitive activities.

Careware - Careware is a software application that is distributed in an effort to help a charity, charitable cause or other philanthropic act. Careware generates funds for a charity using a software business or delivery model.Careware is also known as charityware, helpware or goodware.

Carbon Footprint - A carbon footprint is a measure of the environmental impact of an organization, event, person or product. It measures the total green house gas (GHG) emissions of a given activity or group of activities to provide a measure of the extent to which these activities produce harmful emissions and therefore contribute to global warming.

Carbon-Based Error - A carbon-based error refers to a problem with a computer or a program that is caused by the user rather than the machine. All life on earth depends on carbon, which forms the molecular bonds that make life possible. Therefore, to say that an error is carbon-based is another way of saying it was caused by a computer's human user. Carbon-based errors are a common problem for IT professionals, particularly when it comes to inexperienced users.

Card Identification Number (CID) - A three- or four-digit number on the back of the credit card at the end of the account number (for Visa® and MasterCard®) or on the front of the credit card above the account number (for American Express®).

Cardholder - Any person who opens a credit card account and makes purchases using a credit card.

Cardholder Data - At a minimum, cardholder data consists of the full PAN. Cardholder data may also appear in the form of the full PAN plus any of the following: cardholder name, expiration date, and / or service code.

Carrier - A company that provides wireless telecommunications services.

Cash - Money in the form of paper or coin that is readily available for use as a medium of exchange.

CDMA (Code Division Multiple Access) - The primary digital wireless technology that Verizon Wireless mobile devices use to place calls within the USA and certain other global destinations. It's also used for transmitting data where 4G LTE isn't available. If you have a CDMA phone that isn’t global-capable, you may not be able to use your phone while traveling abroad to certain areas. For example, Europe uses GSM technology and doesn’t accommodate CDMA phones. See also GSM and Global Phone.

CDN - Content delivery network, a distributed system of computers that increases bandwidth for the client by providing copies of creative content (such as media files and metadata) at various points in a network. Creatives are typically hosted on a CDN.

Certificate - An electronic affidavit, issued by a trusted organization, like a bank, that vouches for the identity and the authority of an individual or business to conduct any transaction over the Internet.

Certificate Authority - A Certificate Authority can be an issuer of Security Certificates used in SSL connections, as well as a trusted third-party organization that can verify the identity and origin of a person or organization. These institutions issue digital certificates directly to end-users or to other certificate authorities allowing them to also issue digital certificates. A certificate authority, such as Thawed or VeriSign, vouches for the identity and the authority of an individual or business to conduct transactions over the Internet.

Certified Like-New Replacement Program - A program provided by Verizon Wireless that offers a replacement device in the event that your device experiences an eligible in-warranty failure. Certified Like-New Replacement devices have passed a rigorous testing and refurbishment process. A Customer Service Representative can help you identify if you're eligible for this program.

Certified Pre-Owned Replacement - A pre-owned device that goes through a repair and refurbishment process and must pass a 100+ point quality check in 10 key categories.

CGI (Common Gateway Interface) -  A set of rules that describe how a Web Server communicates with another piece of software on the same machine, and how the other piece of software (the CGI program) talks to the web server. Any piece of software can be a CGI program if it handles input and output Call detail record - the record made within the cellular network of all details of both incoming and outgoing calls made by mobile subscribers. This record is then passed to the billing system for action..

Cgi-bin - The most common name of a directory on a web server in which CGI programs are stored.

Change History – A tool that lists the changes you’ve made to your account during the past two years. See details about changes like bid adjustments, status changes, keyword additions and more. This is particularly helpful because you can filter changes based on a specific date or date range.

Channel - A channel is the network path for wireless transmissions. Each Wi-Fi standard has numerous channels, each of which is a central frequency. There are 11 channels in 802.11b and g networks in the United States and Canada; 14 in most other countries. There are 9 channels in 802.11a networks in the United States, with various counts for other regions of the world. Some countries including the US can have additional channels in the 5 GHz range if they employ DFS. Channels have a bandwidth-the greater the bandwidth, the greater the potential throughput. See 20 MHz and 40 MHz channels.

Channel Bonding - In 802.11b and g networks, multiple channels can be combined to obtain greater throughput when all access points and clients can support it. See also aggregation.

Chargeback - The process of taking back, or debiting, the merchant's credit card funds after the funds have been paid to the merchant. This occurs when a customer disputes a credit card transaction. The merchant must respond to the charge back and provide proof that the product or service was provided to the customer.

Charges - Costs accrued by using services not included in your monthly allowances.

Chat bots - A computer-generated response sent to chat participants. These responses are sent without human interaction.

Checking account - A bank account that the account holder can draw checks against without giving prior notice or having a passbook.

Chips and Salsa - In IT, the colloquial phrase “chips and salsa” refers to the difference between hardware and software technologies. The hardware is the "chips," and the software is the "salsa." IT pros might talk about hardware and software displayed for the purposes of troubleshooting or for other types of descriptions or explanations.

Chip - A small piece of semiconducting material (usually silicon) on which an integrated circuit is embedded (i.e., a computer chip embedded in the smartcard).

Cinema 4d  - CINEMA 4D is a 3D modelling, animation and rendering application developed by MAXON Computer GmbH in Germany. It is capable of procedural and polygonal/subd modeling, animating, lighting, texturing, rendering, and common features found in 3D modelling applications.

City ID - A Caller ID feature that displays the city and state of the number of the incoming call.

Clearing - The process a check goes through to validate and transfer funds between banks. An electronic check will clear in the same manner as a paper check.

Click - A user action, such as clicking an ad with their mouse or touching the screen of a mobile device, which sends them to a click-through URL while OpenX records the event.

Click through - The action of clicking an ad and being taken to another web page via a hyperlink.

Clickable image - A clickable image is any image that has instructions embedded in it so that clicking on it initiates some kind of action or result. On a web page, a clickable image is any image that has a URL or more than one URL embedded in it (i.e. hidden behind it). This can be accomplished simply by including an <A HREF> anchor tag in an HTML <IMG> (image) tag. Embedding more than one URL in an image requires constructing an image map.

Clickbait - Clickbait is online content that uses sensationalized headlines to tempt a person into clicking the blurb to view the original webarticle at the source publication. Clickbait tends to spread quickly through social media and sharing sites, such as Facebook and Twitter.Clickbait may also be written as click bait.

Clicks – In PPC, a click is registered when someone clicks on one of your Search or Display Network ads.

Click-Through Rate (CTR) – A way of measuring the success of an online advertising campaign. CTR is determined by dividing the number of users who clicked on an ad by the number of impressions.

Click-through URL - A destination website address that a viewer goes to when they click on an ad.

Click-to-Call – Another name for Call Extensions, where you can add a business phone number to your ad. The “click-to-call” comes from users having the ability to simply click on the phone number in your ad to place the call.

Client - A software program that is used to contact and obtain data from a Server software program on another computer, often across a great distance. Each Client program is designed to work with one or more specific kinds of Server programs, and each Server requires a specific kind of Client. A Web Browser is a specific kind of Client.

Client ID – Known as an XID in Bing Ads, a Client ID is a 10-digit string of numbers that help distinguish one account from another in the Google system.

Close up - Close up is a shot composition where the frame is filled almost entirely with the subject's face.

Closed Network - A closed network requires users to have authentication information before they can get onto the network.

Closed-Loop Card / Application - A system wherein credit cards can be used only in a single store or group of stores.

Cloud Computing - Refers to the “floating” nature of the actual physical location of the server you may be attaching to over the Internet that is hosted “on the cloud”. The virtual server you access may be in LA one day and in Hong Kong the next in a cloud model. The server is instantiated anywhere there is space and processing power sometimes. So in that way assets you connect to actually seem to float over the face of the earth, like a cloud.

Cloud-Based Payments - Payment technology that stores payment credentials in the cloud (not locally on a device) so that users can make purchases.

Clickprint - A clickprint refers to regular patterns that emerge from a user’s activities on the Web that can be used to identify that user. A clickprint may be made up of a variety of data including the number of pages per visit to a website, the order in which different areas are accessed and the time spent on each page. In theory, monitoring and analyzing browsing data allows a company to assign specific identities to anonymous users or, if all browsing data were available, the company could track and predict a user’s Web activity.

Clicktivism - Clicktivism refers to the use of social media and the Internet to advance social causes. It uses the metrics available through Web analytics to optimize Web pages, emails and online petitions. This optimization is meant to increase user engagement and maximize a campaign's page views.

Clickwrap Agreement - A clickwrap agreement is a type of contract that is widely used with software licenses and online transactions in which a user must agree to terms and conditions prior to using the product or service.

Client - A client is the receiving end of a service or the requestor of a service in a client/server model type of system. The client is most often located on another system or computer, which can be accessed via a network. This term was first used for devices that could not run their own programs, and were connected to remote computers that could via a network. These were called dumb terminals and they were served by time-sharing mainframe computers.

Cloud Capitalist - Companies that have a business model delivering a product or service that is based entirely in a virtual environment accessed through the Internet, or are moving towards that model with their existing business. The products and services offered by cloud capitalists are a break from traditional models in that they are not meant to be downloaded or installed to a computer or wireless device. 

Cloud Computing - Cloud computing is the the use of various services, such as software development platforms, servers, storage, and software, over the Internet, often referred to as the "cloud."

CloudAV - CloudAV is an anti-virus program that runs as an Internet service and facilitates the use of multiple anti-virus programs without running on a local machine and impacting performance. CloudAV is proven effective against the majority of virus and malware, including zero-day threats. 

Codec- A Codec is the method a computer uses to determine the amount of change between frames of a video.

Cold boot - Start the computer by switching on the power. A cold boot recycles the computer’ s random access memory (RAM), thus removing any viruses that might be present in memory.

Collision Avoidance - Collision avoidance (CA) is the method wireless devices typically employ to ensure data transmissions do not interfere with others. CA schemes can use a Clear to Send/Ready to Send (CTS/RTS) scheme where they signal readiness to transmit data, but must wait to be acknowledged by a central controller (AP) before transmitting actual data. Contrast this with Ethernet and its collision detection (CD) scheme where hosts transmit and then listen to see if others are also transmitting, and then sending a jamming signal to indicate a collision, and falling back a random period of time before trying again.

Coaster - In the IT world, “coaster” is most commonly used to describe non-functional compact discs or DVDs. One of these discs that has been damaged or written to improperly, or ruined while burning, does not present data, and is thus useless. The idea is that one can use it for a coaster for a drink, but not much else.

Cocooning - Cocooning is the term used when a person isolates or hides him or herself from the normal social environment and instead opts to stay home and socialize less and less. This behavior is usually exhibited when one perceives the social environment as disturbing, unfavorable, unsafe or even unwelcome. The rapid innovation and growth of technology contributed to an increase in individuals who are cocooning themselves in their homes and choosing to socialize over the Internet rather than through normal human interaction. Because communication and entertainment technology are very prolific and can be found anywhere inside the house in many forms, more and more people are living in physical isolation.

Code Monkey - “Code monkey” is a derogatory term for a programmer or developer. It infers that the person’s skill set is very simple or basic, or that they could be easily replaced.

Common Short Code (CSC) - A Common Short Code (CSC) is a short numeric code used to access certain mobile services via the transmission of special Short Message Service (SMS) messages. A CSC is usually three to six digits in length and designed for quick and easy mobile device entry.Supported by all major carriers, CSCs suit a variety of interactive purposes, including ordering ringtones or making charity donations. 

Computer Operating Properly (COP) - Computer operating properly (COP) is the process of routinely taking acknowledgments from a monitored system and initiating a corrective and restorative measures in case of system failure or a similar problem. COP is enabled through a software or hardware timer that automatically restores a system to its normal operation or attempts to recover it.The computer operating properly process might also be referred to as a watchdog timer.

Conficker - Conficker is a worm that infects computers running the Windows operating system by using known flaws in Windows. Conficker uses dictionary attacks on administrator passwords to hijack machines and link them to a virtual machine that is remotely controlled by its creator.

Console Game - A console game is a type of interactive multimedia software that uses a video game console to provide an interactive multimedia experience via a television of other display device. The game console generally consists of a handheld wireless (or wired) remote control device and a computer that runs the game's software.

Content Scraping - Content scraping is an illegal way of stealing original content from a legitimate website and posting the stolen content to another site without the knowledge or permission of the content's owner. Content scrapers often attempt to pass off stolen content as their own, and fail to provide attribution to the content’s owners. Content scraping can be accomplished via manual copy and paste, or may use more sophisticated techniques, such as using special software, HTTP programming or HTML or DOM parsers.

Content Spoofing - Content spoofing is a hacking technique used to lure a user on to a website that looks legitimate, but is actually an elaborate copy. Hackers looking to spoof content use dynamic HTML and frames to create a website with the expected URL and a similar appearance, and then prompts the user for personal information. Content spoofing is also common with email alerts, account notifications and so on.

Convention Over Configuration - Convention over configuration is a software development approach geared toward developing programs according to typical programming conventions, versus programmer defined configurations. It enables quick and simple software creation while maintaining base software requirements.Convention over configuration is also known as coding by convention.

Cookie Poisoning - Cookie poisoning is an effort by an unauthorized person to access and control aspects of the data in a cookie, usually in order to steal someone’s identity or financial information. Many different kinds of hacking that focus on taking data from cookies can be called cookie poisoning, including theft of passwords, credit card numbers or other identifiers that are stored on cookie files.

Copypasta - Copypasta is a term for a block of text that has been copied and pasted multiple times. This often leads to a kind of generic or stilted result, or something that is slightly jumbled or disjointed. Copypasta makes its way across a social media platform or forum or an email chain to reach multiple users.

Co-location - Most often used to refer to having a server that belongs to one person or group physically located on an Internet-connected network that belongs to another person or group. Usually this is done because the server owner wants their machine to be on a high-speed Internet connection and/or they do not want the security risks of having the server on their own network.

Color Correction - Color Correction is when an editor digitally manipulates colors in post-production.

Color Temperature - Color Temperature is a characteristic quality of the visible light in an image. It ranges from cool to warm, and is measured in the unit Kelvin.

Comma Separated Values (CSV) - A file type that stores data values. CSV files are often used to transfer product feeds.

Commercial messages - Text or multimedia messages that are sent to a mobile device, usually for commercial purposes.

Common Gateway Interface (CGI) Script - A computer program that allows web servers to forward requests for processing to other programs, which then return their results to the web server.

Companion ad units - In an ad unit group, the ad units to serve ads for when the master ad

Companion line item - A line item that delivers multiple related ads to a predefined ad unit group.

Company Name ID - A service that lets your organization choose how outbound calls appear to people you call. For each line that has Company Name ID, the account Administrator can set up a custom name (e.g., the company name, department name, employee's name, etc.), number and image.

Composite - Composite Software, Inc was previously a privately held data virtualization software company based in San Mateo, California. Composite Software was founded in October 2001 by Michael R. Abbott. In 2003, former Active Software founder and webMethods CTO, Jim Green joined Composite Software as CEO.[1] On July 30, 2013,Composite Software was acquired by Cisco Systems for approximately US $180M.

Compositing – Compositing is the process of combining multiple images using post production software.

Compression – Compression as it relates to video refers to reducing the amount of data in a video file. While it can take time to compress a video, it will upload faster, and also download quicker for anyone you choose to share the original file with. We strongly recommend you compress the videos you upload to Vimeo. You'll be able to upload more videos that way!

Compression - Reducing the size of files so they can be transported more easily either on a disk or over the Internet (usually phone lines). Before you can use files that have been compressed, you must uncompress them. On the PC, it’s also known as zipping files after the popular compression utilities Pkzip and Win zip. On the Mac, Stuffit! and Stuffit! Expander are the compression utilities of choice.

Concurrent Operation - Also called Dual Band, APs that can use both 2.4 and 5 GHz bands are capable of concurrent operation. These can offer 802.11n capabilities to compatible clients while also servicing legacy clients using 802.11 b, g, and a.

Confidential - The treatment of information that an individual has disclosed in a relationship of trust, and with the expectation that it will not be divulged without permission to others, in ways that are inconsistent with the understanding of the original disclosure.

CONFIG.SYS - CONFIG.SYS is a configuration file on DOS systems. It is a text file that contains the settings and commands to load drives in a DOS system. This is a primary configuration file for OS/2 and DOS OS. This file was introduced in DOS and is replaced for 32-bit Windows versions with CONFIG.NT.

Configuration File (Config File) - In computer science, configuration files provide the parameters and initial settings for the operating system and some computer applications. Configuration files are usually written in ASCII encoding and contain all necessary data about the specific application, computer, user or file. Configuration files can be used for a wide range of reasons, though they are mostly used by operating systems and applications to customize the environment. Configuration files are used for operation system settings, server processes or software applications.Configuration files are also known as config files.

Connected Device - A device, other than a phone, that connects to the Verizon Wireless network, such as a smart watch or camera. See also Wearable Tech.

Connectivity - Connect to other devices and networks through Wi-Fi, Bluetooth® and Near Field Communication (NFC). Share your files, explore the web and use accessories to maximize your mobile experience.

Consideration - Although the definition of consideration varies from state to state, generally, consideration means that a willing participant is required to purchase something or pay for access to be eligible to enter a game.

Consumer - A person who purchases goods and services.

Contactless - A family of wireless technologies with short range that enables payment transactions via chips embedded in payment cards, tags, key fobs and mobile phones.

Content Aggregator - An organization that contracts with an array of content providers, and redistributes licensed content.

Content Filters - A service that Account Owners and Account Managers can set up to filter content for devices on their account. Content Filters work when connected to the Verizon Wireless network only and is available for no additional charge.

Content Management System (CMS) - A software solution that makes it possible to create, edit, maintain, publish, and display content on the Internet from a single interface or administration tool. In the online retailing context, a CMS may be used to manage a stores product catalog.

Content preview - An advertisement where a sample of mobile content is included. This is very similar to a movie trailer, but, for all digital content including ringtones and wallpapers.

Content targeting - A targeting dimension that describes the context and layout that the ad space exists within.

Content topic - Describes the main subject of the online content surrounding the ad space, such as sports or automotive.

Content type - Describes the main function of the online content surrounding the ad space for targeting capabilities. For example, blog or news.

Contextual Targeting – Targeting feature that matches your ads to other relevant sites on the Display Network using your keywords and/or topics.

Continuous Shot - A feature on select smartphones that takes six pictures in a row when you take a picture.

Conversion - A marketing term that describes when a user or visitor completes some action or achieves some marketing goal. More specifically, conversion is often used to describe when a site visitor converts to a customer, making a purchase.

Conversion Optimizer – Also known as CPA bidding, this is a feature that uses historical conversion data to predict which clicks are likely to be valuable, then changes your bids to help you maximize conversions.

Conversion Rate – Conversions divided by clicks, which represent the rate at which a click on your ad resulted in a conversion or desired action.

Conversion tag - A small piece of code that tracks how users respond to the ads that serve for the orders they are associated with.

Conversion window - The defined amount of time following the view or click of an ad for which a conversion can be attributed.

Cookies – Not to be confused with snack-food, this is a small file saved on people’s computers to help store preferences and other information regarding previous search history.  Engines use these to track conversions and build audiences for remarketing lists.

Coral Painter - Corel Painter is a raster-based digital art application created to simulate as accurately as possible the appearance and behavior of traditional media associated with drawing, painting, and printmaking. It is intended to be used in real-time by professional digital artists as a functional creative tool. The current version is Painter 2016 Update 1, released on January 12, 2016.

Corporate Email - A feature that lets you connect to your company’s email server on your mobile device. It syncs your email, contacts, calendar and tasks, helping you stay in touch with your office while you're away from your desk.

Corporation - A distinct legal entity and business structure, wherein the business is separate from its shareholders.

Cost Data - The information imported from a Google AdWords account into an Analytics account.

Cost-Per-Click (CPC) – The amount of money an advertiser pays search engines and other Internet publishers for a single click on its advertisement that brings one visitor to its website.

Cost-Per-Lead (CPL) – Also referred to as Cost-Per-Acquisition (CPA), this refers to the amount of money an advertiser pays search engines and other internet publishers for a lead generated on its advertisement.

Cost-Per-Phone Call (CPP) – Maximum amount you’re willing to pay for a phone call. This feature will only work when using call extensions and a Google forwarding number with your ad.

Cost-Per-Thousand (CPM) – Pricing means advertisers pay their maximum bid amount for every one thousand impressions received.  This option is only available on the display network.

Cost-Per-View (CPV) – Used with True View video campaigns, this is a bidding option that allows users to pay each time your video is played.

Country Code - A two- or three-digit code assigned to each country. When placing an international call, you must dial this code as a prefix to the phone number.

Country Code Top-Level Domain (ccTLD) - A country code top-level domain (ccTLD) is a top-level domain name that is used to define the domain for a particular country or a geographical area. Every country has a domain name reserved for it; this is generally denoted by a ccTLD, which is generally two letters long.

Coupon - A ticket or document that can be exchanged for a financial discount or rebate when purchasing a product.

Coverage - The area in which a mobile device can receive service.

CPA - Online advertising payment model where the advertiser pays for each specified action (a purchase, a form submission, etc.) linked to the advertisement.

CPC - Cost per click, a pricing method which calculates cost based on the number of times a user clicks on an ad.

CPD - Cost per day, a payment model where advertisers pay on a daily basis for their ads to be displayed on a particular website.

CPL - Cost per lead, a payment model determined by the number of website visitors who clicked on a particular ad. Prices range, on average, from $1-$10. AKA “pay per lead (PPL)” or “cost per inquiry (CPI).”

CPM - Cost per mille, a pricing method which calculates cost based on the number of impressions (per 1000).

CPM (Cost Per Thousand Impressions) - CPM term used in online advertising and marketing related to web traffic. It refers to the cost of internet marketing campaigns where advertisers pay for every time their ad is displayed, usually in the form of a banner ad on a website or e-mail.

CPNI Settings (Customer Proprietary Network Information Settings) - Permission settings enabling an Account Owner to control whether Verizon Wireless shares certain consumer and billing information with its affiliate, agent and parent companies for marketing purposes.

CPU (Central Processing Unit) - This is pretty much the brain of your computer. It processes everything from basic instructions to complex functions. Any time something needs to be computed, it gets sent to the CPU. The CPU can also be referred to simply as the “processor” or “chip”.

CPU-Z - CPU-Z is a freeware application for Microsoft Windows or Android devices that gathers system information and displays the details in a single screen. The application is updated on a regular basis and supports a large number of processors and chipsets. CPU-Z is developed by CPUID.

Cramming - A form of fraud in which small charges are added to a bill by a third party without the subscriber’s consent or disclosure. These may be disguised as a tax or some other common fee, and may be several dollars or even just a few cents. The crammer’s intent is that the subscriber will overlook and ultimately pay these small charges.

Crane - A Crane is a device used to capture moving shots with height, comprised of an arm with a camera attached to one end and a counterweight attached to the other. Often called a jib.

Crash - The sudden failure of a software application, operating system, or a hardware device such as your computer’s hard drive. One of the most common reasons for computer crashes is that too many programs are being run at once. The first thing to try if your computer crashes is to reboot it.

Crazy bump - Crazybump is some sort of graphic tool which I find to be very different from other common graphic applications. It lets you create 3D materials from one of your photos. Also, you can create maps that have various textures.

Creative - The media asset associated with an ad, such as an image or video file.

Creative template - Enables the creation of custom code for non-standard ad formats that can be reused to speed up the process of creating multiple similar ads.

Credit - The extension of funds issued by a bank that allows a consumer to purchase goods or services from a merchant. The consumer then pays back the bank either in full or in installments, at an interest rate determined by the bank.

Credit - A reimbursement or other sum of money posted to your account.

Credit card - A bank-issued card that allows consumers to purchase goods or services from a merchant on credit.

Credit Card Charge Role - WSU Departmental employee who has been authorized to accept and process credit card payments over the phone, via mail order, in person or web based virtual terminal. This individual may not have the Credit Card Refund Role in conjunction with this role.

Credit card gateway - A reference to both the actual machine and the company hosting the credit card gateway server, acting as a middleman between the merchant and the merchant bank. The Credit Card Gateway passes data between the merchants business Web site and the banks.

Credit Card Refund Role - WSU Departmental employee who has been authorized to process approved credit card refunds. This individual may not have the Credit Card Charge Role in conjunction with this role.

 Credit Deposit - The value of a merchant's credit card purchases that are credited to its bank account after the acquirer buys the merchant's sales slips. The deposit is credited. It is not funded until the acquirer gets the monetary value from the issuer during settlement.

CrackBerry - CrackBerry is the nickname given to a BlackBerry device, a handheld smartphone to which users have a tendency to become addicted. The term is a combination of “crack” - or crack cocaine, which is a highly-addictive narcotic - and BlackBerry. While the reference to the BlackBerry as a CrackBerry is often made in jest, mental health experts say that the lure of these wireless devices is real, and the behavior of those caught up in it may be similar to that of substance abusers. If weaned off their BlackBerry phones, these users may exhibit withdrawal symptoms.

Creeping Featuritis - Creeping featuritis, a creeping featurism variant, is a continuously evolving syndrome in which features added to enhance product popularity result in increased complexity and reduced efficiency. Creeping featuritis is rampant in computer software and hardware.Creeping featuritis is also known as feature creep and featureitis. A creeping featuritis spoonerism is feeping creaturitis.

CRM (Customer Relationship Management) - All aspects of interaction a company has with its customer, whether it is sales or service-related.

Crop factor - Crop factor is a number, generally in the range of 1.3 to 2.0, that indicates the ratio of a sensor's imaging area to that of a full frame sensor. Multiplying a lens' focal length by a sensor's crop factor gives the actual focal length for that sensor/lens combination.

Crossfade - Crossfading is a phenomenon through which a smooth transition is created between two sounds. This audio effect often finds its applications in audio engineering wherein crossfading is used to blend two or more sounds in the same song smoothly, without doing it abruptly. Crossfading is often utilized by DJs who blend various tracks into a single song in order to enhance the music performance. This technique is majorly used to avoid any sudden silent gaps between two tracks, which could prove to be annoying for audiences.

CSS (Cascading Style Sheet) - A standard for specifying the appearance of text and other elements. CSS was developed for use with HTML in Web pages but is also used in other situations, notably in applications built using XPFE . CSS is typically used to provide a single “library” of styles that are used over and over throughout a large number of related documents, as in a web site. A CSS file might specify that all numbered lists are to appear in italics. By changing that single specification the look of a large number of documents can be easily changed.


Background Color Background Image Background-repeat Background-attachment Background-position Border-style Border Width Text Color Text Alignment Text Decoration
Text Transformation Text Indent word-spacing white-space vertical-align text-transform text-shadow ine-height letter-spacing direction
Grouping Selectors Nesting Selectors Static Positioning Fixed Positioning Relative Positioning Absolute Positioning Floating List Items Inline List Items Border-radius Border-style
box-shadow margin font margin-bottom margin-left margin-right margin-top padding padding-bottom padding-left
padding-right padding-top marquee-direction marquee-loop marquee-play-count marquee-speed marque-style overflow overflow-style overflow-x
rotation rotation-point visibility font-style font-variant font-size font-family font-stretch font-weight clear-left
clear-right clear-both display-inline display-block display-list item display-tapble display-table rowgroup display-ruby base display-table footer display-run in
han ging-punctuation letter-spading punctuation-trim text-align text-align-last text-decoration text-emphasis text-indent text-justify text-outline
text-shadow text-tranform text-wrap unicode-bi di word-break word-spacing word-wrap column-count column-fill coumn-gap
column-rule column-rule-color column-rule-style column-rule-width column-span column-width opcity box-align box-direction box-flex
voice-balance voice-duration voice-family voice-rate voice-pitch voice-pitch-range voice-stress voice-volume list-style list-style-position
list-style-type marker-offset animation-name animation-duration animation-direction animation-delay animation-play-state animation-iteration-count animation-timing-function transtion
transtion-delay transtion-duration transtion-property transtion-timing-function max-height max-width min-height min-width speak phonemes
cue-before cue-after mark-after mark-before pause-before pause-after rest-after rest-before overflow-y

 C-stand- A C-stand is essentially a heavy-duty tripod. C-stands are used by the grip department to execute various lighting and rigging tasks on a set.

CTR - Click-through rate, the percentage of impressions that results in a click through. For example if a banner was clicked on 87 times after being shown 1000 times, it would have a CTR or click-through rate of .087 or 8.7% (87/1000 = 0.087×100 = 8.7).

CTR Optimized - An ad delivery mode that enables you to serve higher performing (based

Curl - Curl is a reflective object-oriented programming language for interactive web applications whose goal is to provide a smoother transition between formatting and programming. It makes it possible to embed complex objects in simple documents without needing to switch between programming languages or development platforms.The Curl implementation initially consisted of just an interpreter, but a compiler was later added. plications developers.

Custom Reporting - Google Analytics offers the option to create custom reports based on the metrics and dimensions you choose. Custom reports present the information you selected, organized in a way that works for you. Once you create a custom report, it will be available to you each time you login.

Custom targeting - A targeting dimension that describes custom key-value pairs that a publisher defines based on what they know about their visitors.

Customer Agreement - The rights and obligations you agree to when you do business with Verizon Wireless. The Customer Agreement contains important information about your service, including our ability to make changes to your service or the agreement’s terms, our liability if things don’t work as planned, and how any disputes between us must be resolved in arbitration or small claims court.

Customer Relationship Management (CRM) - A software solution specifically devoted to organizing, synchronizing, and automating a business' customer relationships.  

Customer Service Representative - A trained Verizon Wireless expert who can help you with any questions or concerns regarding your wireless service or mobile device. Our Customer Service Representatives are available over the phone, online and in Verizon Wireless stores. They have in-depth knowledge of all the products and services we offer.

 Customer Service Role - WSU Departmental employee who provides front-line customer service to customers. This individual will answer customer inquiries about orders, credit card payments, returning merchandise, and refunds. 

Cut-in – Cut-in also known as insert shots, typically show objects or props that a character is manipulating.

Cyberspace - Term originated by author William Gibson in his novel Neuromancer. The word Cyberspace is currently used to describe the whole range of information resources available through computer networks.