click below
click below
Normal Size Small Size show me how
Ethics / Protection
Computer Use Ethics and Computer Protection Vocabulary
Term | Definition |
---|---|
Acceptable Use Policy (AUP) | A legal contract detailing the conditions a technology provider has set that a user must agree to in order to use the service. |
Harassment | Repeated messages or images meant to threaten, embarrass, or make someone uncomfortable. |
Username | A combination of letters, numbers, or symbols that are used to identify a specific account. |
Password | A security code used with an account identifier to grant access to a specific account. |
Creative work | An idea or artwork recorded in digital or hard copy form |
Copyright | Legal protection for creative people's opportunity to benefit from their work, by giving them ownership rights. |
Creative Commons | A specific kind of copyright that allows others to copy, share, and improve on your work, if credit is given to you. |
License | A definition of copyright where you (as the owner) can set rules as to how others can use you work. |
Infringement (or Piracy) | The illegal use, copying, or giving away of someone's copyright work, whether for money or not. |
Plagiarize | Using or slightly changing someone else's work without giving them credit. |
Public Domain | Creative work that is free for all to use however they want, because the rights to it have been given away or have expired. |
Fair Use | The ability to use small parts of someone's copyrighted work without permission, for purposes like education, journalism, criticism, etc. |
Netiquette | Etiquette or manners for online communication. |
Emoji | Small cartoon pictures often used for showing feelings in online communications. |
Emoticon | Use of combinations of keyboard characters like ;-) to express emotions in online communications. |
Spam | Unwanted email that often tries to sell you things. One message to many people, or many messages to one person. |
Chain Letters | Messages that try to get you to resend them on to many people that you know. Often used to gather email addresses for sale to spammers. |
Personal Information | Phone numbers, addresses, birthdays, passwords, account numbers, current location, last names, school names, etc. that are sought out by identity thieves and others. |
Vandalism | Intentional damage to data or equipment |
Authorized (adjective) | Have permission to access or use |
Troll | Someone that seeks to start arguments in online discussions |
Anonymous | Someone that keeps their identity hidden. |
Flames | Messages that are insulting to others |
Flame wars | The exchange (sometimes by many people) of insulting messages |
Privilege (noun) | Something you get to do because you are allowed to do it |
Hackers | Someone skilled in programming, and (these days) skilled in breaking into computers or computer networks. |
White hat hackers | Ethical hackers that test computer network security to help improve it. |
Gray hat hackers | Hackers that attack or break into computer networks for what they think are good purposes (steal money to give it to the poor, expose corruption, etc.) |
Black hat hackers | Unethical hackers that attack or break into computer systems to steal money or secrets, or do other illegal things |
Malware | Software that is intended to damage or disable computers and computer systems. |
Virus | Malware that "infects" other files to make copies of itself. |
Worm | Malware that spreads through infected network devices, like routers, printers, etc. |
Trojan horse | Malware that appears desirable (like a game or a movie) but actually contains something harmful |
Payload | The effects that malware brings, like spyware, adware, or ransomware |
Antivirus software | Software that searches for malware code to disable or delete it. Must be updated and run often to do its job. |
Surge protector | A device that protects computers and other electronic devices from sudden increases in power. |