Appendix
Wikipedia Contributions
This book uses material from the following Wikipedia articles:
- .htaccess
- .htpasswd
- .NET Framework
- 8.3 filename
- A/B testing
- Abstract data type
- Accelerated Mobile Pages
- Acceptance test-driven development
- Acceptance testing
- Access control
- Access key
- Access token
- Access-control list
- Accessibility
- ACID
- Acknowledgement (data networks)
- Acqui-hiring
- ActionScript
- Active redundancy
- Active Server Pages
- Active users
- Address Resolution Protocol
- Adobe ColdFusion
- Adobe Dreamweaver
- Adobe Flash
- Adobe Flash Player
- Adobe Photoshop
- ads.txt
- Advanced Encryption Standard
- Advanced persistent threat
- Affordance
- Agile software development
- AirMosaic
- Ajax (programming)
- ALGOL
- Algorithm
- Aliasing
- Amazon Route 53
- Amazon S3
- Amazon Simple Queue Service
- Amazon Virtual Private Cloud
- Amazon Web Services
- Angular (web framework)
- AngularJS
- Animation
- Anonymous function
- Anti-pattern
- Apache Maven
- Apache Subversion
- Apache Tomcat
- Applet
- Application programming interface
- Application software
- APT (software)
- Arena (web browser)
- Array data structure
- ASP.NET
- Aspect ratio (image)
- AssemblyScript
- Assignment (computer science)
- Assistive technology
- Assistive Technology Service Provider Interface
- Association for Computing Machinery
- Asynchronous module definition
- Asynchrony (computer programming)
- at (command)
- Attribute (computing)
- Augmented reality
- Authentication
- Authorization
- Automation
- AV1
- Babel (transpiler)
- Backlink
- Backup
- Backward compatibility
- Bada
- Bandwidth (computing)
- Base64
- Baseline (typography)
- Bash (Unix shell)
- Basic access authentication
- BBCode
- Behavior-driven development
- Best practice
- Bézier curve
- Bidirectional text
- Big O notation
- Binary large object
- Binary number
- Binary search algorithm
- Bitbucket
- Black hat (computer security)
- Black-box testing
- Blacklist (computing)
- Blink (browser engine)
- Blog
- Blogosphere
- BMP file format
- Bookmark (digital)
- Bookmarklet
- Boolean data type
- Border Gateway Protocol
- Bounce rate
- Boundary value problem
- Bourne shell
- Branching (version control)
- Braille
- Breadcrumb navigation
- Breakpoint
- Brotli
- Browser engine
- Browser extension
- Browser Helper Object
- Browser sniffing
- Browsing
- Bug tracking system
- Bugzilla
- Bushnell’s Law
- Byte order mark
- Bytecode
- Cache (computing)
- California Consumer Privacy Act
- Call to action (marketing)
- Callback (computer programming)
- Camel case
- Camino (web browser)
- Canonical link element
- CAP theorem
- CAPTCHA
- Caret
- Cascading Style Sheets
- CDATA
- Certificate authority
- Chaos engineering
- CheiRank
- Chrome OS
- Chromium (web browser)
- Cipher
- Class (computer programming)
- Class variable
- Classless Inter-Domain Routing
- Clean URL
- Click-through rate
- Clickjacking
- Client (computing)
- Client-side
- Cloaking
- Clojure
- Closure (computer programming)
- Cloud computing
- Cloud storage
- CMYK color model
- CNAME record
- Coalescing (computer science)
- Code coverage
- Code golf
- Code point
- Code of conduct
- Code refactoring
- Code review
- Code smell
- CodePen
- CoffeeScript
- ColdFusion Markup Language
- Color blindness
- Color management
- Color scheme
- Color wheel
- Comma-separated values
- Command (computing)
- Command-line interface
- Command-query separation
- Comment (computer programming)
- Common Gateway Interface
- Common Vulnerabilities and Exposures
- Common Vulnerability Scoring System
- CommonJS
- Communication protocol
- Community of practice
- Compatibility mode
- Compiler
- Complementary colors
- Component-based software engineering
- Composite Capability/Preference Profiles
- Computer cluster
- Computer code
- Computer compatibility
- Computer file
- Computer network
- Computer programming
- Concurrency (computer science)
- Concurrent Versions System
- Conditional (computer programming)
- Conditional comment
- Cone of Uncertainty
- Conflict of interest
- Consistency
- Console application
- Constant (computer programming)
- Constructor (object-oriented programming)
- Content (media)
- Content delivery network
- Content management system
- Content negotiation
- Content Security Policy
- Content sniffing
- Context switch
- Continuous delivery
- Continuous deployment
- Continuous integration
- Control flow
- Convention over configuration
- Conway’s law
- Corporate design
- Corporate identity
- Country code top-level domain
- Coupling (computer programming)
- Craft
- Create, read, update and delete
- Critical path method
- cron
- Cross-origin resource sharing
- Cross-site request forgery
- Cross-site scripting
- Cryptographic nonce
- Cryptography
- CSS box model
- CSS framework
- CSS image replacement
- CSS Zen Garden
- CSS-in-JS
- cURL
- Currying
- Customer relationship management
- Cyclomatic complexity
- D3.js
- Daemon (computing)
- Dark pattern
- Darknet
- Dart (programming language)
- Data
- Data center
- Data compression
- Data control language
- Data definition language
- Data lake
- Data manipulation language
- Data storage
- Data stream management system
- Data type
- Data validation
- Data visualization
- Data warehouse
- Database
- Database engine
- Database index
- Database normalization
- Database server
- Dead code elimination
- Debugging
- Deep web
- Denial-of-service attack
- Deno (software)
- Dependency injection
- Dependency inversion principle
- Deployment environment
- Deprecation
- Descender
- Design
- Design by contract
- Design pattern
- Device fingerprint
- DevOps
- Dialog box
- Digital display advertising
- Digital rights management
- Disabilities affecting intellectual abilities
- Disability Discrimination Act 1995
- Disciplined agile delivery
- Display contrast
- Display resolution
- Distributed Concurrent Versions System
- Distributed object communication
- Distributed version control
- Dither
- Django
- DMARC
- DMZ (computing)
- DNS over HTTPS
- DNS root zone
- DNS spoofing
- DocBook
- Docker (software)
- Document Object Model
- Document Style Semantics and Specification Language
- Document type declaration
- Document type definition
- Documentation
- Dojo Toolkit
- Domain name
- Domain name registrar
- Domain Name System
- Domain Name System Security Extensions
- Domain-driven design
- DomainKeys Identified Mail
- Don’t repeat yourself
- Doorway page
- Dots per inch
- Downtime
- Duck typing
- Duplicate code
- Dynamic Host Configuration Protocol
- Dynamic HTML
- Dynamic Language Runtime
- Dynamic web page
- Dyslexia
- E-commerce
- EBCDIC
- Eclipse (software)
- Ecma International
- ECMAScript
- Effectiveness
- Efficiency
- Electron (software framework)
- Electronic Frontier Foundation
- Em (typography)
- Emacs
- Email spoofing
- Email address
- Empty string
- Encapsulation (computer programming)
- End-of-file
- Environment variable
- Equality Act 2010
- Error
- Ethics
- Etiquette
- European Accessibility Act
- Event (computing)
- Event loop
- Event-driven architecture
- Eventual consistency
- Exception handling
- Exception handling syntax
- Exit status
- Express.js
- Extensible Application Markup Language
- Extract, transform, load
- Extreme programming
- Eye tracking
- Facade pattern
- Facebook Instant Articles
- Facebook Platform
- Fagan inspection
- Failover
- Fallback
- False positives and false negatives
- Favicon
- Feature creep
- Feature detection (web development)
- Feature phone
- Federal Information Processing Standards
- Federated Learning of Cohorts
- Federation (information technology)
- FIFO (computing and electronics)
- Figma (software)
- File locking
- File manager
- File system
- File Transfer Protocol
- Filler text
- Fingerprint (computing)
- Fitts’s law
- Flash of unstyled content
- Flat design
- Flock (web browser)
- Fluent Design System
- FOAF (ontology)
- Folksonomy
- Font
- Foobar
- Foreign key
- Fork (software development)
- Form (HTML)
- Formatting Output Specification Instance
- Forward compatibility
- Forward secrecy
- Fragment identifier
- Frame (World Wide Web)
- Frame rate
- Framekiller
- Free and open-source software
- Free Software Foundation
- Free variables and bound variables
- Front and back ends
- FTPS
- Fully qualified domain name
- Function as a service
- Functional programming
- Functional testing
- Fuzzing
- Gamma correction
- Garbage collection (computer science)
- Garbage in, garbage out
- Gateway (telecommunications)
- Gecko (software)
- General Data Protection Regulation
- Generic top-level domain
- Geo-fence
- GIF
- Git
- GitHub
- GitHub Copilot
- GitLab
- GNU
- GNU General Public License
- GNU Project
- Go (programming language)
- Goanna (software)
- Golden ratio
- Google Cloud Platform
- Google Lighthouse
- Google PageSpeed Tools
- Google TalkBack
- Google Web Server
- Gopher (protocol)
- Grapheme
- Graphical user interface
- Graphics processing unit
- GraphQL
- GRASP (object-oriented design)
- Greasemonkey
- Greenfield project
- Grid (graphic design)
- Grid computing
- Guetzli
- gulp.js
- Gutter
- gzip
- Hackathon
- Hacker
- Haml
- Hardware security module
- Hash function
- Hash table
- Hashtag
- Head-of-line blocking
- Headless software
- Helper class
- Hexadecimal
- High Efficiency Image File Format
- Higher-order function
- Hick’s law
- Hit (Internet)
- HITS algorithm
- HMAC
- HMAC-based One-Time Password
- Home page
- Home screen
- Hooking
- Host (network)
- Host Identity Protocol
- Hostname
- HSL and HSV
- HTML
- HTML element
- HTML5 Boilerplate
- HTTP cookie
- HTTP Flood
- HTTP Strict Transport Security
- HTTP/2
- HTTP/3
- HTTPS
- HTTPS Everywhere
- Human-computer interaction
- Hungarian notation
- Hype cycle
- Hypertext
- Hypertext Transfer Protocol
- Hypervisor
- IBM Home Page Reader
- IBM WebExplorer
- ICANN
- Icon (computing)
- Identifier
- IDL (programming language)
- Image
- Image map
- Immutable object
- Indexed color
- Indexed Database API
- Industrial design
- Information architecture
- Information design
- Information foraging
- Information overload
- Information retrieval
- Information security
- Information security operations center
- Infrastructure as a service
- Infrastructure as code
- Inheritance (object-oriented programming)
- Initiative for Open Authentication
- Inline linking
- Input/output
- Instance variable
- Institute of Electrical and Electronics Engineers
- Integer
- Integer (computer science)
- Integrated development environment
- Intellectual property
- IntelliJ IDEA
- Interaction design
- Interactive Advertising Bureau
- Interface (computing)
- Interface description language
- Interface segregation principle
- International Organization for Standardization
- International Telecommunication Union
- Internationalization and localization
- Internationalized Resource Identifier
- Internet
- Internet Architecture Board
- Internet Assigned Numbers Authority
- Internet Engineering Task Force
- Internet Explorer
- Internet Information Services
- Internet Message Access Protocol
- Internet Protocol
- Internet Relay Chat
- Internet service provider
- Internet Society
- InterNIC
- Interoperability
- InterPlanetary File System
- Interpolation
- Interstitial webpage
- Intranet
- Inversion of control
- IOPS
- iOS
- IP address
- iptables
- IPv4
- IPv6
- JAR (file format)
- Jasmine (JavaScript testing framework)
- Java (programming language)
- Java Database Connectivity
- Java Development Kit
- Java servlet
- Java virtual machine
- JavaFX
- JavaScript framework
- JavaScript library
- JavaScript Style Sheets
- JavaServer Pages
- JAWS (screen reader)
- Jenkins (software)
- Jetty (web server)
- Jinja (template engine)
- Jira (software)
- Joint Photographic Experts Group
- Joomla
- JPEG
- jQuery
- JScript
- JSLint
- JSON
- JSON Feed
- JSON Web Encryption
- JSON Web Signature
- JSON Web Token
- JSON-LD
- JSONP
- Just-in-time compilation
- Just-in-time manufacturing
- K-Meleon
- Kanban (development)
- Kerberos (protocol)
- Kerning
- Key (cryptography)
- Key frame
- Key-value database
- Knowledge Graph
- Kubernetes
- LAMP (software bundle)
- Landing page
- Laravel
- Latency (engineering)
- LaTeX
- Law of conservation of complexity
- Lazy loading
- Lead programmer
- Lead time
- Leading
- Lean thinking
- Legibility
- Less (stylesheet language)
- Let’s Encrypt
- Letter case
- Letter-spacing
- libwww
- Light-on-dark color scheme
- Lightweight Directory Access Protocol
- Lightweight markup language
- Likert scale
- Link farm
- Link rot
- Linked data
- lint (software)
- Linux
- Linux Standard Base
- Liskov substitution principle
- Lisp (programming language)
- List of DNS record types
- List of HTTP status codes
- List of XML and HTML character entity references
- Literal (computer programming)
- Little’s law
- Load balancing (computing)
- Local area network
- Local variable
- Locale (computer software)
- Location information server
- Log file
- Login
- Long-term support
- Look and feel
- Lossless compression
- Lossy compression
- Lynx (web browser)
- MAC address
- Machine learning
- macOS
- Macromedia HomeSite
- MacWWW
- Magic (programming)
- Maintainability
- Maintenance (technical)
- Makefile
- MAMP
- Man-in-the-middle attack
- Markdown
- Marketing
- Markup language
- Massively parallel
- Masthead (American publishing)
- Material Design
- Mathematical markup language
- Mathematical optimization
- MathML
- MD2 (hash function)
- MD4
- MD5
- MD6
- MEAN (software bundle)
- Media (communication)
- Media queries
- Media type
- Memoization
- Menu (computing)
- Merge (version control)
- Message authentication code
- Meta element
- Metadata
- Method (computer programming)
- Method stub
- Metro (design language)
- Microformat
- Microservices
- Microsite
- Microsoft Active Accessibility
- Microsoft Edge
- Microsoft FrontPage
- Microsoft Silverlight
- Microsoft Windows
- Middleware
- MIME
- Minification (programming)
- Minimum viable product
- Mixin
- Mobile computing
- Mobilegeddon
- Modal window
- Model-view-controller
- Model-view-viewmodel
- Modernizr
- Modular design
- Monolithic application
- Monorepo
- Mosaic (web browser)
- Moving Picture Experts Group
- Multi-factor authentication
- Multimedia
- Multiple inheritance
- Muphry’s law
- Murphy’s law
- Mustache (template system)
- Mutual authentication
- MySQL
- Name binding
- Name server
- Namespace
- NaN
- National Institute of Standards and Technology
- Native (computing)
- NativeScript
- Natural key
- Natural user interface
- Negative space
- Nesting (computing)
- Net Promoter
- Netscape Navigator
- Network address translation
- Network domain
- Network packet
- Newbie
- Newline
- News aggregator
- Next.js
- Nginx
- Ninety-ninety rule
- Nmap
- Node (computer science)
- Node.js
- nofollow
- Non-disclosure agreement
- NonVisual Desktop Access
- Normative
- NoSQL
- npm (software)
- Null coalescing operator
- Null device
- Null pointer
- Number sign
- Numerical digit
- Nuxt.js
- OAuth
- Obfuscation (software)
- Object (computer science)
- Object-oriented programming
- Observer pattern
- OCSP stapling
- OKR
- One-time password
- Online analytical processing
- Online Certificate Status Protocol
- Online transaction processing
- OOCSS
- Open source
- Open-closed principle
- OpenID
- OpenType
- Opera Mini
- Operand
- Operating system
- Operator (computer programming)
- Operator (mathematics)
- Orca (assistive technology)
- Orthogonality (programming)
- Orthographic ligature
- OS-level virtualization
- OSI model
- Out of memory
- Over-the-air programming
- OWASP
- Page layout
- PageRank
- Pageview
- Pair programming
- Paper prototyping
- Paradigm
- Parallax scrolling
- Parameter (computer programming)
- Pareto principle
- Parkinson’s law
- Parsing
- Patch (computing)
- Path (computing)
- PATH (variable)
- Pay-per-click
- Payload (computing)
- Paywall
- PCDATA
- Penetration test
- Perceived performance
- Percent-encoding
- Performance indicator
- Perl
- Permalink
- Persona (user experience)
- Personal data
- PhantomJS
- Phishing
- PHP
- PhpStorm
- ping (networking utility)
- pip (package manager)
- Pixel
- Plain text
- Plane (Unicode)
- Platform as a service
- Plug-in (computing)
- Pointer (computer programming)
- Pointing device
- Polyfill (programming)
- Polymer (library)
- Pop-up ad
- Port (computer networking)
- Portable Network Graphics
- Post Office Protocol
- PostCSS
- Posting style
- Postmortem documentation
- PowerShell
- Predication (computer architecture)
- Prefetching
- Presto (browser engine)
- Primary key
- Primitive data type
- Privacy
- Program optimization
- Programming language
- Progressive enhancement
- Progressive web application
- Property (programming)
- Proxy server
- Public key certificate
- Punycode
- Puppet (software)
- Push technology
- Python (programming language)
- qooxdoo
- Quality (business)
- Quality assurance
- Quality control
- Queries per second
- Query
- Query language
- QUIC
- Quirks mode
- Race condition
- RADIUS
- Raku (programming language)
- Random variable
- Random-access memory
- Ranking
- Raster graphics
- Rate limiting
- React (web framework)
- React Native
- Reactive programming
- Read-eval-print loop
- Readability
- README
- Real user monitoring
- RealAudio
- RealVideo
- Recursion (computer science)
- Redundancy (engineering)
- Redux (JavaScript library)
- Reed-Solomon error correction
- Referential transparency
- Regular expression
- Relational data stream management system
- Relational database
- Relational model
- Remote Desktop Protocol
- Remote procedure call
- Replay attack
- Request for Comments
- Reserved word
- Resource Description Framework
- Responsibility assignment matrix
- Responsive web design
- Reverse proxy
- Revision tag
- RGB color model
- Rich Text Format
- Rich web application
- Right-to-left
- Robots exclusion standard
- Robustness principle
- Root directory
- Root element
- Root name server
- Rooting (Android)
- Round-trip delay time
- Router (computing)
- Routing
- Routing table
- RPM Package Manager
- RSS
- RTFM
- Rubber duck debugging
- Ruby (programming language)
- Ruby on Rails
- Runbook
- Safari (web browser)
- Same-origin policy
- Sandbox (computer security)
- Sandbox (software development)
- Sass (stylesheet language)
- Scaled agile framework
- Scope (computer science)
- Screen magnifier
- Screen reader
- Scripting language
- Scrolling
- Scrum (software development)
- SeaMonkey
- Search engine indexing
- Search engine marketing
- Secure Shell
- Security Assertion Markup Language
- Security hacker
- Security operations center
- security.txt
- Search engine optimization
- Selenium (software)
- Semantic Web
- Semantics (computer science)
- Sender Policy Framework
- Separation of concerns
- Serialization
- Serif
- Server (computing)
- Server farm
- Server Name Indication
- Server-side
- Serverless computing
- Service discovery
- Service-oriented architecture
- Service-level agreement
- Session (computer science)
- Session hijacking
- Set (abstract data type)
- SGML entity
- Shebang (Unix)
- Shell (computing)
- Shim (computing)
- Simple Mail Transfer Protocol
- Single point of failure
- Single responsibility principle
- Single-page application
- Site map
- Sitemaps
- Slowloris (computer security)
- Smoke testing (software)
- Snake case
- SOA record
- SOAP
- Soft launch
- Software
- Software as a service
- Software bug
- Software crisis
- Software deployment
- Software development
- Software development kit
- Software framework
- Software modernization
- Software prototyping
- Software testing
- Software versioning
- SOLID
- Solution stack
- Source lines of code
- Source-code editor
- Source-to-source compiler
- Spaghetti code
- Spam
- Spamdexing
- Spamming
- SPDY
- Specification (technical standard)
- Spectre (security vulnerability)
- Speech synthesis
- Spike (software development)
- Spinner (computing)
- Splash screen
- Spoofing attack
- SQL
- SQL injection
- Squarespace
- sRGB
- SSH File Transfer Protocol
- Stack (abstract data type)
- Stack Overflow
- Stand-up meeting
- Standard Generalized Markup Language
- State (computer science)
- Statement (computer science)
- Static web page
- Storage area network
- Strategic design
- Stream (computing)
- Streaming media
- String (computer science)
- Structural similarity
- Style sheet (web development)
- Stylus (stylesheet language)
- Subject Alternative Name
- Subject-matter expert
- Subnetwork
- Subresource Integrity
- Subroutine
- Superkey
- Superuser
- Surface web
- Surrogate key
- Switch statement
- Symbol (programming)
- Symfony
- Synchronized Multimedia Integration Language
- Syntactic sugar
- Syntax (programming languages)
- syslog
- Tabnabbing
- Tag management system
- Tag soup
- tar (computing)
- Tcl
- Technical debt
- Technical standard
- Technology roadmap
- Telnet
- Template processor
- Ternary operation
- Test-driven development
- TeX
- Textile (markup language)
- The Open Group Architecture Framework
- Theme (computing)
- Third-party source
- Thread (computing)
- Three-click rule
- Time to first byte
- Time to live
- Time-based One-Time Password
- Timed text
- Timestamp
- Tizen
- Tokenization (data security)
- TOML
- Top-level domain
- TOP500
- Tor (anonymity network)
- Tracing (software)
- Transclusion
- Transcreation
- Transmission Control Protocol
- Transport Layer Security
- Travis CI
- Tree (data structure)
- Tree shaking
- Trident (software)
- TrueType
- Trust on first use
- TrustRank
- Turing completeness
- Type conversion
- Type design
- Type system
- Typeface
- TypeScript
- TYPO3
- Typography
- UDP flood attack
- Unicode
- Unicode Consortium
- Unicode equivalence
- Unified Modeling Language
- Uniform Resource Characteristic
- Uniform Resource Identifier
- Uniform Resource Name
- Uninitialized variable
- Unique selling proposition
- Unit testing
- Universal Access
- Universal design
- Universally unique identifier
- Uniwidth typeface
- Unix
- Unix philosophy
- URL
- URL redirection
- Usability
- Usability inspection
- Usability testing
- Use case
- Usenet
- User (computing)
- User agent
- User Datagram Protocol
- User experience
- User interface
- User interface markup language
- User story
- User-centered design
- Userscript
- UTF-8
- UTF-16
- UTF-32
- UTM parameters
- Validator
- Value (computer science)
- Value-driven design
- Variable (computer science)
- Variable fonts
- Vector graphics
- Velocity (software development)
- Verification and validation
- Version control
- vi
- Viewport
- Vim (text editor)
- Virtual inheritance
- Virtual LAN
- Virtual machine
- Virtual private cloud
- Virtual private network
- Virtual reality
- Virtualization
- Visual Basic for Applications
- Visual impairment
- Visual Studio Code
- Voice over IP
- Voice phishing
- VoiceOver
- VoiceXML
- Vue.js
- W3C Geolocation API
- WAR (file format)
- Waterfall model
- Web 2.0
- Web Accessibility Initiative
- Web analytics
- Web application
- Web application firewall
- Web beacon
- Web browser
- Web colors
- Web Components
- Web content
- Web Content Accessibility Guidelines
- Web crawler
- Web design
- Web development
- Web development tools
- Web feed
- Web framework
- Web IDL
- Web indexing
- Web navigation
- Web Open Font Format
- Web page
- Web performance
- Web platform
- Web portal
- Web resource
- Web service
- Web standards
- Web Standards Project
- Web storage
- Web syndication
- Web template system
- Web tracking
- Web typography
- Web worker
- WebAssembly
- WebAuthn
- WebDAV
- WebGL
- WebKit
- WebM
- Webmaster
- Webmention
- WebP
- Webpack
- Website
- Website wireframe
- WebSocket
- WebVTT
- Well-formed document
- Wget
- WHATWG
- White-box testing
- Whitelisting
- Whitespace character
- WHOIS
- Wide area network
- Widows and orphans
- Wiki
- Window-Eyes
- Windows Aero
- Wireless Application Protocol
- Wireless Markup Language
- Wix.com
- WordPress
- Workaround
- World Wide Web
- World Wide Web Consortium
- WorldWideWeb
- Wrapper function
- Write once, run anywhere
- WYSIWYG
- X.509
- x-height
- XForms
- XHP
- XHTML
- XLink
- XML
- XML Schema (W3C)
- XML-RPC
- XMLHttpRequest
- XPath
- XPointer
- XQuery
- XSL
- XUL
- Yahoo! Query Language
- YAML
- Yandex Browser
- Year 2000 problem
- You aren’t gonna need it
- YUI Library
- Z shell
- Zero-based numbering
- Zero-configuration networking
- Zip (file format)
- Zombie cookie
- Zone file
The original works, which have been released under a CC BY–SA 3.0 license, have been shortened and edited.
MDN Web Docs Contributions
This book uses material from the following articles by Mozilla contributors:
- About MDN Web Docs
- Abstraction
- Accept-CH
- ALPN
- Application Context
- Arrow function expressions
- Blob
- Block
- Bounding Box
- Browsing context
- Buffer
- Call stack
- Canvas
- Channel Messaging API
- Client hints
- Code splitting
- Continuous Media
- Cross-Origin Resource Policy (CORP)
- Cross-Origin-Embedder-Policy
- CSS Logical Properties and Values
- CSS Object Model (CSSOM)
- CSS preprocessor
- CSS Scroll Snap
- CSS selectors
- Custom properties: CSS variables
- Destructuring assignment
- Document directive
- DOM onevent handlers
- Domain sharding
- Dynamic typing
- Effective connection type
- Empty element
- Exception
- Falsy
- Fetch API
- First contentful paint
- First CPU idle
- First input delay
- First Meaningful Paint
- First paint
- First-class Function
- Flex
- Flexbox
- font-display
- Function
- function
- Global object
- Global scope
- Global variable
- Graceful degradation
- Grid
- Grid Tracks
- Hoisting
- Houdini
- HTTP request methods
- IIFE
- Inheritance and the prototype chain
- Intersection Observer API
- Intrinsic Size
- Jank
- Local scope
- Long Tasks API
- Main thread
- Mobile First
- Null
- Number
- Origin
- Page load time
- Page prediction
- prerender
- Promise
- Pseudo-class
- Pseudo-element
- Pseudocode
- Quirks Mode and Standards Mode
- ReferenceError
- Reflow
- Replaced element
- Request header
- Response header
- Responsive design
- REST
- Routers
- Scrollport
- Secure contexts
- Shadow tree
- SharedWorker
- Shorthand properties
- Snap positions
- Speed index
- Spread syntax
- Strict mode
- Synchronous
- The stacking context
- this
- Time to interactive
- try…catch
- undefined
- User-Agent
- Using custom elements
- Vendor Prefix
- Visual formatting model
- Web fonts
- XSLT
- yield
The original works, which have been licensed under CC BY–SA 2.5, have been edited.