Browse Definitions :
Definition

com

What is com?

On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name. Usually, it describes the entity owning the domain name as a commercial organization. Along with the second-level domain name -- for example, the "whatis" in whatis.com -- the top-level domain name is required in web and email addresses.

"Com" is also short for "commercial," although operation of a commercial website isn't required to own a domain suffix.

What is com in a URL?

A Uniform Resource Locator (URL), commonly called a web address, is the address of a unique resource on the web. It has three parts:

A URL has three parts: protocol, domain and path
A URL is composed of a protocol, domain and path.
  • protocol, the primary access medium;
  • domain, which refers to the website and where com is often seen; and
  • path, which refers to a location on the site.

Web browsing and most other Internet activities rely on the Domain Name System (DNS) to provide the information necessary to connect users to remote hosts. DNS falls into a category of utility protocols that underpin communications on the Internet. These are robust protocols that help keep traffic flowing and servers talking; most users don't know they exist.

Who assigns and manages domain names?

The Internet Corporation for Assigned Names and Numbers (ICANN) has overall responsibility for assigning domain names, Internet Protocol (IP) addresses and many other Internet parameters. Day-to-day responsibility is delegated to specific registrars, such as Network Solutions and several competing companies for .com, .org, .net and .edu top-level domains. Although .com is the most popular domain extension, .net came first. The Nordic Infrastructure for Research and Education first debuted Nordu.net in 1985.

Today, we also have domains such as .agency, .co, .fund, .media, .shop, .store, .solution, .xyz, and many more. Specific criteria are set forth for the use of the top-level domain name in RFC 1591: Domain Name System Structure and Delegation. The top-level domain names administered by ICANN and its delegate agencies are .com, .edu, .gov, .io, .net and .org.

how the domain name system works
ICANN is responsible for assigning domain names using the domain naming system.

Domain name applicants within the U.S. may also be able to register a name under a U.S. top-level domain name based on geography. Refer to RFC 1480: The US Domain and visit the U.S. Domain Registry for registration procedures.

Top-level domain names for countries other than the U.S. are administered by each country and based on the International Standards Organization (ISO) 3166 list of country codes.

What is a com port?

The serial port interfaces found on personal computers (PCs) are called COM or a communication port. It may refer to a single port or several emulated ports like USB 3.0 and Bluetooth.

What is com in electrical?

In electrical switches, com stands for common. For example, in a one-way light switch, there are two terminals usually called C or common. One terminal represents the live wire or input supply power to the switch. The second terminal, typically called L1, is the output that connects to the light fixture.

What is COM in Microsoft?

In Microsoft software architecture, COM stands for Component Object Model. This component software architecture defines the structure where program routines or objects can be built, called up and executed in a Microsoft Windows environment.

Explore IPv4 vs. IPv6 and learn the difference between a MAC address and IP address.

This was last updated in November 2022

Continue Reading About com

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close