controlled by or connected to another computer or network online
working surface of a desk desktop
legal right given to an originator to print, publish, perform, film, or record the originator's work. copyright
any message passed through digital devices. digital communication
where computer networkers where users can communicate. chat room
regularly updated website or web page, typically one run by an individual or small group blog
capable of copying itself and destroying data. virus
electronic communication used to bully a person or a group of people. cyberbullying
applications that enable users to create and share content or to participate in social networking. social media
set of rules you should follow in order to make the internet better for others, and better for you. digital etiquette
acquisition and use of a person's private identifying information identity theft
A hostile, strongly worded message that may contain obscene language. flame
specific features or software that parents manage the online activities of children parental control
any device used to communicate provocative messages and/or sexual images sexting
A program, or set of instructions, that runs on a computer. software
any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm
An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim
A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load
might include word processing, spreadsheet, database, presentation, and email application application software
a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style blog
a hardware device capable of transmitting an analog or digital signal over the telephone, other communication. communication device
an electronic device for storing and processing data computer
Computer literacy is the ability to use computers and related technology efficiently, with a range of skills covering levels from elementary use to programming and advanced problem solving. computer literacy
completed partially or entirely by using a computer. computer-aided
Manufacturing: make (something) on a large scale using machinery.
Convergence: the process or state of converging.
(central processing unit):the part of a computer in which operations are controlled and executed cpu
facts and statistics collected together for reference or analysis data
Desktop computer: is a term commonly used to describe a system unit.
A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software developer
a camera that records and stores digital images digital camera
is the set of competencies required for full participation in a knowledge society digital literacy
an electronic version of a printed book that can be read on a computer or handheld device designed specifically for this purpose ebook
E-book reader: is a mobile electronic device that is designed primarily for the purpose of reading digital e-books and periodicals.
system with a dedicated function within a larger mechanical or electrical system embedded computer
Enterprise computing: is a buzzword that refers to business-oriented information technology that is critical to a company's operations.
Enterprise user: is computer software used to satisfy the needs of an organization rather than individual users.
execute: and software engineering is the process by which a computer or a virtual machine performs the instructions of a computer program.
a list of questions and answers relating to a particular subject, especially one giving basic information for users of a website FAQ
Game console: A specialized desktop computer used to play video games.
graphical user interface: a visual way of interacting with a computer using items such as windows, icons, and menus, used by most modern operating systems.
Green computing: is the environmentally responsible and eco-friendly use of computers and their resources.
handheld computer: is a computer that can conveniently be stored in a pocket (of sufficient size) and used while you're holding it.
Hardware: tools, machinery, and other durable equipment.
Home user: A user is a person who uses a computer or network service.
Information: is stimuli that has meaning in some context for its receiver. When Information is entered into and stored in a computer, it is generally referred to as data.
Information processing: is the change (processing) of information in any manner detectable by an observer.
cycle: (sometimes called a fetch–decode–execute cycle) is the basic operational process of a computer.
input device: is (a piece of computer hardware equipment) used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.
installing : install program. Also called a "setup program" or "installer," it is software that prepares an application (software package) to run in the computer.
Instant message: a message sent via the Internet that appears on the recipient's screen as soon as it is transmitted.
Internet: a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Internet-enabled: the single worldwide computer network that interconnects other computer networks, on which end-user services, such as World Wide Web sites or data archives, are located, enabling data and other information to be exchanged, (Also called) the Net.
Laptop computer: a computer that is portable and suitable for use while traveling.
Mainframe: (colloquially referred to as "big iron") are computers used primarily by large organizations for critical applications, bulk data processing, such as census, industry and consumer statistics, enterprise resource planning, and transaction processing.
Memory: is any physical device capable of storing information temporarily or permanently.
Microblogging: A type of blog that lets users publish short text updates. Bloggers can usually use a number of service for the updates including instant messaging, email, or Twitter. The posts are called microposts, while the act of using these services to update your blog is called microblogging.
Mobile computing: is a generic term that refers to a variety of devices that allow people to access data and information from wherever they are. Sometimes referred to as "human-computer interaction," mobile computing transports data, voice, and video over a network via a mobile device.
Mobile device: (or handheld computer) is a computing device small enough to hold and operate in the hand. ... Mobile devices may run mobile operating systems that allow third-party apps specialized for said capabilities to be installed and run.
Mobile users: A person traveling with a smartphone, tablet or other portable device that requires Internet access via a cellular system.
Netbook: is a small, light, low-power,that has less processing power than a full-sized laptop but is still suitable for word processing, running a Web browser and connecting wirelessly to the Internet.
network: is defined as a group of two or more computer systems linked together. There are many types of computer networks, including the following: local-area networks(LANs): The computers are geographically close together (that is, in the same building).
notebook computer: is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings.
Online:Recently, however, the term "online" usually means being connected to the Internet. The connection can be through a phone line, using a dial-up or DSL modem, a cable line via a cable modem, or through a wireless connection. A computer can also be online via a connection to a computer network.
Online banking: a method of banking in which transactions are conducted electronically via the Internet.
Investing online: also known as online trading or trading online, is a process by which individual investors and traders buy and sell securities over an electronic network, typically with a brokerage firm.
Online social network is an online platform which people use to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections.
Operating system: the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills Digital Literacy
a computer designed for use by one person at a time. Personal Computer
is the collection of physical parts of a computer system. Hardware
is a generic term for organized collections of computer data and instructions Software
one of the most essential parts of a computer system. Motherboard
A central processing unit CPU
refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. Back Up
The primary computer storage device, which spins, reads and writes one or more fixed disk platters. Hard Drive
Short for digital versatile disc or digital video disc DVD
a device or program that enables a computer to transmit data over Modem
a widely used sans-serif typeface developed in 1957 by Swiss typeface designer Max Miedinger Helvetica
Universal Serial Bus USB
The global communication network that allows almost all computers worldwide to connect and exchange information. Internet
providing a common topic identifier in text and chat messages so they can be searched as a group. Commonly used in tweets hashtag
connects to the motherboard of a computer system and generates output images to display. Video Card
Small circuit board that controls processing within a computer microprocessor
Physical parts of a computer Hardware
A program that contains instructions for a computer Software
Applications are also known as Apps
Consists of information Message
Refers to the method used to enter or transmit your message to a computer Input
Information or data retrieved or received from a computer Output
"Brain of the computer" CPU
Input/Output device that reads data from and writes data to a disK Diskdrive
Output device that displays text and graphics on a screen Monitor
Input device used for commands and navigation Mouse
Input device with an arrangement of letters, etc. Keyboard
First line of defense Password
An unauthorized user able to access and misuse information Hacker
A destructive program loaded onto a computer Virus
Defamation by written or printed words or pictures Libel
Defamation by oral utterance Slander
A program that allows users to view web pages and online information Browser
Sotware that has been written to detect, isolate, and destroy viruses Antivirusprogram
A web address URL
Any word, phrase, or picure that, when clicked, take the user to another location Hyperlink
Electronic mail Email
Playing video and sound in real time Streaming
Retrieving somehting fromt he internet and storing it on a disk drive Downloading
Using material antoher person has created and claims it as your own Plagiarism
company of the type of touch screen phone most of the world uses today apple
does not eliminate servers serverless computing
a video adapter video card
is the integration of digital information with live video augmented reality
a conventional method of transmitting data Analogue
is software that allows you to view a PDF document Adobe Acrobat Reader
is a document sent with an email message Attachment
refers to the part of an application that performs an essential task not apparent to the user Back-end
smallest unit of measurement in computing. bit
a wireless communications technology intended to replace cables bluetooth
a saved link to a particular Web page bookmark
to load and initialise the operating system on a computer. boot
A software program that allows you to surf the web Browser
is temporarily stored on your computer. Cache
microprocessor that performs many functions and calculations that make your computer run Chip
refers to a website's text and information, as opposed to its design and structure Content
refers to measures designed to protect your computer Cybersecurity
a small program that allows a peripheral device such as a printer or scanner to connect to your PC Device driver
method by which users access and save or "pull down" software or other files to their own computers Download
electronic mail is a way of sending messages over the internet Email
an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data Computer
any part of your computer that has a physical structure, such as the keyboard or mouse. Hardware
any set of instructions that tells the hardware what to do and how to do it Softwarwe
the metal and plastic box that contains the main components Computer Case
one of the main ways to communicate with a computer. Keyboard
another important tool for communicating with computers. Commonly known as a pointing device. Mouse
is used to print documents, photos, and anything else that appears on your screen. printer
is the computer's main circuit board motherboard
your system's short-term memory RAM
where your software, documents, and other files are stored hard drive
is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language operating system
What id a shorter term for Wireless Internet Connection Wifi
is a type of software that allows you to perform specific tasks app
llows you to write a letter, design a flyer, and create many other types of documents word proccessor
the tool you use to access the Internet web browser
any type of software that is designed to damage your computer or gain unauthorized access to your personal information Malware
measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of instructions per second. speed
When you save a file, the data is written to the hard drive, which acts as long-term storage
is responsible for what you see on the monitor video card
also called an audio card—is responsible for what you hear in the speakers or headphones sound card
What do you call a program that is sent to harm your computer virus
What is it called to break into another computer system hacking
What software can we use to protect out computer ---- virus? anti
I'm online and I meet someone my age in a chat room. Is it OK to give them my address or phone number? NO
In stead of using a photo of yourself, you should create an...? avatar
an email message sent to a large number of people without their consent, usually promoting a product or service spam
what is a computer program sent to gather information from your computer called? malware
What is a network security system used to stop unauthorised access called? firewall
what should you use to protect your user area? password
A password should included numbers, uppercase letters, symbols and ......... letters? lowercase
what is it called if people are nasty to you online? cyberbullying
Dont open ...... from people you dont know attachments
A term used to stop a computer reaching something on the internet, to stop a program running, or to stop someone from contacting you on a chat service. block
A program that can do things without the user of the computer having to give it instructions. Bot
A means of preventing certain types of material, keywords or anything you decide to block from reaching your computer. filter
An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops. phishing
a program that secretly monitors your actions. spyware
a person who posts inflammatory comments or messages in an online community such as a forum, chatroom, blog or on social networking sites. troll
when copying information or images off the internet you must check for what legal information? copyright
you need to check that the information you get off the web is R....... reliable
computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway