Question | Answer |
Adware | A form of software that displays advertising on the user’s computer. Some types are installed with the user’s knowledge, but others may not. |
Blog | A written personal journal posted on the Web with free access by the general public. Blog comes from the words WeB LOG. |
Bookmark/Favorite | Menu entry or icon on a computer that is usually created by the user and that serves as a shortcut to a previously viewed location (as an Internet site) |
Chat | Real-time typed conversation that takes place on a computer |
Com | Top-level domain that stands for commercial (for profit) Web sites |
Cookies | Data generated by a Web server and stored in a text file on your computer that allows a Web site to store information for later retrieval. |
Domain name | Text version of an IP address |
Downloading | Process of a computer receiving information |
E-commerce | Electronic commerce - business transactions that occur over the Internet |
Edu | Top-level domain that stands for education |
Flaming | Sending an angry, hostile, or abusive electronic message |
Gov | Top-level domain that stands for the government |
Hit | Any Web site name that is listed as the result of a search |
Home page | The first page of a Web site |
HTML | Hypertext Markup Language – a set of special codes that format a file for use as a Web page |
HTTP | Hypertext Transfer Protocol - the Internet protocol rules used for the transmission of a page |
Hyperlink | Can contain text, graphics, sound, video, and built-in connections to other Web pages or information |
Internet | A large worldwide network of networks that are connected to one another in various ways |
IP Address | Unique identifying numbers assigned to each computer connected to the Internet; it’s just like a phone number |
ISP | Internet Service Provider – provides access to the Internet such as telephone and cable companies |
LAN | Local Area Network – a data communications network that typically connects personal computers within a very limited geographical area – usually a single building. |
Malware | Malicious code that includes viruses, worms, bots, Trojan horses, and spyware |
Mil | Top-level domain that stands for the military |
Net | Top-level domain that stands for network providers |
Netiquette | Etiquette governing appropriate communication on the Internet |
Network | A collection of computers that are connected so that they can share resources |
Org | Top-level domain that stands for nonprofit organizations |
Phishing | E-mail-based or IM scam designed to persuade you to reveal confidential information. |
Portal | Offers users a variety of Internet services from a single location such as search engines, e-mail, blogs, chat rooms, etc. One example is Yahoo! |
Search engine | Program used to find Web sites and Web pages by entering words or phrases called search text |
Spam | Unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once |
URL | Uniform Resource Locator – another name for a domain name |
Web browser | Program that allows you to view Web pages such as Google Chrome, Microsoft Edge, Mozilla Firefox |
Web page | Electronic document posted on a Web site |
Web site | Collection of related Web pages |
WWW | Worldwide collection of electronic documents commonly known as the World Wide Web (WWW) |
Uploading | The sending of data from a local system to a remote system, such as a server, with the intent that the remote system should save a copy of whatever is being transferred. |
Intranet | A network operating like the World Wide Web but having access restricted to a limited group of authorized users (as employees of a company) |
Boolean operators | A word or symbol that describes a relationship between keywords and thereby helps you create a more focused query. Common operators include AND, OR, NOT. |
Firewall | Software or hardware designed to filter out suspicious packets attempting to enter or leave a computer, makes sure that incoming information was actually requested and is not an unauthorized intrusion. |
Spyware | A type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes. It tracks and reports many of your activities to a remote location. |
WiFi | Wireless fidelity – the most popular wireless LAN technology |
Wikipedia | A collection of documents that form an encyclopedia. Visitors to this site can view definitions and information on a huge variety of topics and make changes to entries that are not correct or complete. |
Bluetooth | A short-range (3-300 feet) wireless network technology that’s designed to make its own connections between electronic devices, for example a printer, a mouse, keyboard, a PC, or a cell phone without wires, cables, or any direct action from a user. |
Pharming | The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one in order to obtain personal information such as passwords, account numbers, etc. |
HTTPS:// | Indicates the URL is a secure connection. Another sign of a secure connection includes a padlock icon in the address bar at the top of the screen or status bar near the bottom of the screen. |