Definitions.Terminology

= ** Learn the Terms ** = Information Source – []

** NOTE: Vocabulary List without definitions on last page **

** Adware ** A type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.

** Anti-virus Software ** Protects your computer from viruses that can destroy your data, slow your computer's performance, cause a crash, or even allow spammers to send email through your account.

** Avatar ** A graphic alter ego you create to use online; can be a 3D character or a simple icon, human or whimsical.

** Backing up ** Making copies of computer data in case something happens to your machine or operating system and the information is lost.

** Badware ** Bad software; includes viruses and spyware that steal your personal information, send spam and commit fraud. (See Malware.)

** Bandwidth ** A measure of the "speed" of an internet connection.

** Blocking software ** A program to filter content from the internet and restrict access to sites or content based on specific criteria.

** Blog ** Short for "web log," a site where you regularly post personal observations.

** Bookmark ** A web browser feature that allows you to save the addresses of interesting or frequently used websites, so that you can readily revisit them.

** Broadband ** A number of different methods used for high speed internet access such as DSL, cable modems, fiber optics, and mobile wireless, all of which are permanently connected to the internet through different means.

** Browser ** A program that allows a user to find, view, hear, and interact with material on the internet.

** Buddy list ** A list of people who you can chat with through an instant messaging program.

** Cache ** A form of computer memory that allows you to access stored information, such as web addresses you've recently typed into your browser, more quickly. Pronounced "cash."

** Chat room ** An online space where you can meet and exchange information through messages displayed on the screens of others who are in the "room."

** Cookies ** A small text file that a website can place on your computer's hard drive to collect information about your activities on the site or to allow the site to remember information about you and your activities.

** COPPA ** The Children’s Online Privacy Protection Act; it gives parents control over what information websites can collect from their kids under 13.

** Cyberbullying ** Bullying or harassment that takes place online; includes posting embarrassing pictures or unkind comments on a person’s profile or sending them via instant message or email.

** Cyberspace ** Used to distinguish the physical world from the digital, or computer-based world.

** Domain ** A segment of internet space, denoted by the function or type of information it includes; current domains include ".com" for commercial sites, ".gov" for governmental ones, and ".org" for non-commercial organizations.

** Download ** To copy files from one computer to another over the internet.

** Drive-by Download ** Software that installs on your computer without your knowledge when you visit certain websites. To avoid drive-by downloads, make sure to update your operating system and Web browser regularly.

** DSL ** Digital Subscriber Line: A type of high speed internet using standard phone lines and the local telephone network. DSL is almost always slower than cable modem or fiber optics.

** Encryption ** The scrambling of data into a secret code that can be read only by software set to decode the information.

** End User Licensing Agreement (EULA) ** A provider's legal terms. You, as the "end user," may be required to "click" to accept before you can download software.

** Filter ** Software that screens information on the internet, classifies its content, and allows the user to block certain kinds of content.

** Firewall ** Hardware or software that blocks unauthorized communications to or from your computer; helps keep hackers from using your computer to send out your personal information without your permission.

** Gigabyte ** A measure of computer memory equaling 1,024 megabytes.

** GPS ** "Global Positioning System," a global navigation satellite system that is used in cars or phones to determine location and provide directions.

** Hacker ** Someone who uses computers and the internet to access other people's computers without permission.

** Hacking ** Breaking into a computer or network by evading or disabling security measures.

** Hardware ** The mechanical parts of a computer system, including the central processing unit (CPU), monitor, keyboard, and mouse, as well as other equipment like printers and speakers.

** HTML (Hypertext Markup Language) ** A coding language used to create documents and websites on the internet and control how they appear.

** HTTP (Hypertext Transfer Protocol) ** The standard language that computers connected to the World Wide Web use to communicate with each other.

** Instant messaging (IM) ** Enables two or more people to chat in real time, and notifies you when someone on your friends list is online.

** Intellectual property ** Creative products that have commercial value, including copyrighted property such as books, photos and songs.

** Internet Protocol (IP) ** The computer language that allows computer programs to communicate over the internet.

** IP Address ** A computer's "address," it consists of a series of numbers separated by periods.

** Java ** A computer programming language invented by Sun Microsystems that enables web pages to include animations, calculators, scrolling text, sound effects, and games.

** JPEG ** Short-hand for "Joint Photographic Experts Group," a computer file format that reduces the size of graphics by using compression.

** Keystroke Logger ** A device or program that records each keystroke typed on a particular computer.

** LAN (Local Area Network) ** A network of connected computers that are generally located near each other, such as in an office or company.

** Limited user account ** An online setting that grants someone access to some of the computer’s functions and programs but only allows an administrator to make changes that affect the computer.

** Malware ** Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud. (See Badware.)

** Media Access Control (MAC) Address ** A unique number that the manufacturer assigns to each computer or other device in a network.

** Monitoring Software ** Programs that allow a parent or caregiver to monitor the websites a child visits or email messages he or she reads, without blocking access.

** Netiquette ** The informal rules of internet courtesy, enforced exclusively by other internet users.

** Network ** A group of two or more computers that are able to communicate with one another.

** Online Profiling ** Compiling information about consumers' preferences and interests by tracking their online movements and actions in order to create targeted ads.

** Operating System ** The main program that runs on a computer. An operating system allows other software to run and prevents unauthorized users from accessing the system. Major operating systems include UNIX, Windows, MacOS, and Linux.

** Opt-in ** When a user explicitly permits a website to collect, use, or share his or her information.

** Opt-out ** When a user expressly requests that his/her information not be collected, used and/or shared. Sometimes a user's failure to "opt-out" is interpreted as "opting in."

** Parental Controls ** Tools that allow parents to prevent their children from accessing certain internet content that they might find inappropriate.

** Password ** A secret word or phrase used with a user name to grant access to your computer or protect sensitive information online.

** Patch ** Software downloaded to fix or update a computer program.

** PDA ** Personal Digital Assistant; can be used as a mobile phone, web browser or portable media player.

** Peer-to-peer (P2P) file-sharing ** Allows you to share files online – like music, movies or games – through an informal network of computers running the same sharing software.

** Personal information ** Data that can be used to identify you, like your name, address, birth date or Social Security number.

** Phishing ** When scam artists send spam, pop-ups or text messages to trick you into disclosing personal, financial or other sensitive information.

** Pop-up Messages or Ads ** Unsolicited advertising that appears as its own browser window.

** Privacy settings ** Controls available on many social networking and other websites that you can set to limit who can access your profile and what information visitors can see.

** Profile ** A personal page you create on a social networking or other website to share information about yourself and communicate with others.

** RAM ** Short-hand for "Random Access Memory," it's the hardware inside your computer that retains memory on a short-term basis and stores information while you work.

** Router ** A device that connects two or more networks. A router finds the best path for forwarding information across the networks.

** Security software ** Identifies and protects against threats or vulnerabilities that may compromise your computer or your personal information; includes anti-virus and anti-spyware software and firewalls.

** Sexting ** Sending or forwarding sexually explicit pictures or messages from a mobile phone.

** Smart phone ** A mobile phone that offers advanced capabilities and features like a web connection and a portable media player

** SMS ** "Short Messaging Service"; technology that allows text messages to be sent from one mobile phone to another.

** Social networking site ** A website that allows you to build a profile and connect with others.

** Software ** A computer program with instructions that enable the computer hardware to work. System software — such as Windows or MacOS — operate the machine itself, and applications software — such as spreadsheet or word processing programs — provide specific functionality.

** Spam ** Unsolicited commercial email, often sent in bulk quantities.

** Spammer ** Someone who sends unsolicited commercial email, often in bulk quantities.

** Spam Zombies ** Home computers that have been taken over by spammers without the consent or knowledge of the computer owner. The computers are then used to send spam in a way that hides the true origin.

** Spyware ** Software installed on your computer without your consent to monitor or control your computer use.

** Texting ** Sending short messages from one mobile phone to another.

** Trojans ** Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.

** TRUSTe ** An online seal program. websites displaying the seal have agreed to abide with certain principles regarding user privacy. You can access the site's privacy policy by clicking on the seal.

** Tween ** A child between 8 and 12 years old.

** Upload ** To copy or send files or data from one computer to another.

** User name ** An alias used with a password to grant access to accounts and websites.

** Video Calling ** Internet services that allow users to communicate using webcams.

** Virtual World ** A computer-simulated online "place" where people use avatars – graphic characters – to represent themselves.

** Virus ** Malware that sneaks onto your computer – often through an email attachment – and then makes copies of itself.

** Webcam ** A video camera that can stream live video on the web; may be built into the computer or purchased separately.

** Wi-Fi Protected Access (WPA) ** A security protocol developed to fix flaws in WEP. Encrypts data sent to and from wireless devices within a network.

** Wired Equivalent Privacy (WEP) ** A security protocol that encrypts data sent to and from wireless devices within a network. Not as strong as WPA encryption.

** Wireless Network ** A method of accessing high speed internet without the computer being linked by cables.

** World Wide Web ** An internet system which distributes graphical, hyperlinked information through a browser.

** Worm ** A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.

** Digital Literacy Vocabulary List **

** Adware ** ** Anti-virus Software ** ** Avatar ** ** Backing up ** ** Badware ** ** Bandwidth ** ** Blocking software ** ** Blog ** ** Bookmark ** ** Broadband ** ** Browser ** ** Buddy list ** ** Cache ** ** Chat room ** ** Cookies ** ** COPPA ** ** Cyberbullying ** ** Cyberspace ** ** Domain ** ** Download ** ** Drive-by Download ** ** DSL ** ** Encryption ** ** End User Licensing Agreement (EULA) ** ** Filter ** ** Firewall ** ** Gigabyte ** ** GPS ** ** Hacker ** ** Hacking ** ** Hardware ** ** HTML (Hypertext Markup Language) ** ** HTTP (Hypertext Transfer Protocol) ** ** Instant messaging (IM) ** ** Intellectual property ** ** Internet Protocol (IP) ** ** IP Address ** ** Java ** ** JPEG ** ** Keystroke Logger ** ** LAN (Local Area Network) ** ** Limited user account ** ** Malware ** ** Media Access Control (MAC) Address ** ** Monitoring Software ** ** Netiquette ** ** Network ** ** Online Profiling ** ** Operating System ** ** Opt-in ** ** Opt-out ** ** Parental Controls ** ** Password ** ** Patch ** ** PDA ** ** Peer-to-peer (P2P) file-sharing ** ** Personal information ** ** Phishing ** ** Pop-up Messages or Ads ** ** Privacy settings ** ** Profile ** ** RAM ** ** Router ** ** Security software ** ** Sexting ** ** Smart phone ** ** SMS ** ** Social networking site ** ** Software ** ** Spam ** ** Spammer ** ** Spam Zombies ** ** Spyware ** ** Texting ** ** Trojans ** ** TRUSTe ** ** Tween ** ** Upload ** ** User name ** ** Video Calling ** ** Virtual World ** ** Virus ** ** Webcam ** ** Wi-Fi Protected Access (WPA) ** ** Wired Equivalent Privacy (WEP) ** ** Wireless Network ** ** World Wide Web ** ** Worm **