Java Games: Flashcards, matching, concentration, and word search.

Internet Vocabulary Two Activities

AB
blogshort for web log; a journal that is available on the web in which a user can post an entry of his thoughts
Booleana system of logical thought used when searching the Internet that specifies relationships between keywords or phrases. The most commonly used operators are AND, OR, and NOT.
browsersoftware that allows you to find, see, and hear material on the World Wide Web
chatreal-time text conversation between two users in a chat room
cookiea notation fed to a file on your computer when you visit an Internet site. If you revisit the site the notation allows the website to identify you as a return guest and may offer you products tailored to your interests or tastes.
copyrightthe legal right of ownership to the work produced in books, music, plays, movies, graphics/pictures and computer software. To copy this work you must get permission from the owner of the legal right.
downloadthe transfer of files or software from a remote computer to your computer
Children's Online Privacy Protection Acta law that requires site owners to help protect the privacy of kids 13 and younger. Site owners are required to post and explain the elements of the privacy policy they are using.
phishingthe act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
identity theftstealing the identity of others by using their credit card, driver’s license, social security or other personal identification numbers
meta-search enginetype of search tool that scans multiple search engines at once and provides results based on keywords submitted
spywaresoftware that secretly gathers information about a person or that is designed to take control of a computer’s operation without the knowledge of its user
piracythe act of stealing valuable property by copying software, music, graphics/pictures, movies and books
plagiarismcopying someone else’s work and pretending that you wrote it
privacy policya statement on a website describing what information about you is collected by the site and how it is used
screen namethe name you call yourself when you communicate online
search enginea function that lets you search for information and websites with keywords you specify
virusa computer program created to cause damage to other computers. It can erase files or change a computer’s hard disk causing damage.
ethicsmoral beliefs and rules about right and wrong
World Wide Weba collection of documents and applications residing on Internet servers around the world
private identity informationinformation about yourself that you should not share online because it can be used for identity theft. Examples include your full name and your email address.
personal informationinformation about yourself that may reveal interests or facts about yourself but cannot be used to identify you. Examples include your age, gender, or favorite team.
spamunwanted commercial email messages sent to thousands of recipients at a time
malwaresoftware created to damage your personal files or your computer, or steal your private identity information. A computer virus is an example.
Internet chain letteran email message that has been forwarded to you and asks that you forward it to people you know
cyberbullyingIntentional and repeated use of cell phone or computer networks to cause harm or distress to other kids
hackinggetting into a computer without permission

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities