in full Common Gateway Interface.Specification by which a Web server passes data between itself and an application program.Typically, a Web user will make a request of the Web server, which in turn passes the request to a CGI application program. The program processes the request and passes the answer to the server, which in turn sends it to the user. The entire interchange follows the rules of the CGI specification, which is actually part of the HTTP protocol. CGI application programs can be written in such programming languages as C++ and Visual Basic, but are usually written in Perl.
* * *in full common gateway interfacea standard that allows external applications located on personal computers or other devices to interact with information servers on the Internet.CGI programs are capable of sending many kinds of media, such as documents, images, and audio clips. Most Web sites with fields for input use CGI, and a great deal of the dynamic content on the Web is done using CGI. The possibilities are limitless, but a CGI program needs to be efficient to be effective. In order to create effective CGIs, developers need to know HTML (hypertext markup language), CGI, and HTTP (hypertext transfer protocol) commands, and they also need computer programming skills.CGI applications can be written in any computer programming language that is supported by the host computer, including compiled languages such as C and FORTRAN and scripting languages such as Perl and TCL. CGI programs commonly use the HTTP methods GET and POST and the environment variables QUERY_STRING and PATH_INFO to facilitate communication between a client and a Web server. POST is more complicated to work with, but it supports more complex data. In order to be effective, CGI transmissions must contain header messages expressing the return program's data type. Security is also essential to the employment of CGI programs because they can open the host system to unlimited Web access. In order to improve security, programs are placed in a directory called /cgi-bin. This directory, which must be monitored by an administrator, is kept away from other Web content, and access to it is often limited to certain users. This allows the Web server to execute approved programs while excluding unauthorized access.
* * *