| A | B |
| blog | short for web log; a journal that is available on the web in which a user can post an entry of his thoughts |
| Boolean | a system of logical thought used when searching the Internet that specifies relationships between keywords or phrases. The most commonly used operators are AND, OR, and NOT. |
| browser | software that allows you to find, see, and hear material on the World Wide Web |
| chat | real-time text conversation between two users in a chat room |
| cookie | a notation fed to a file on your computer when you visit an Internet site. If you revisit the site the notation allows the website to identify you as a return guest and may offer you products tailored to your interests or tastes. |
| copyright | the legal right of ownership to the work produced in books, music, plays, movies, graphics/pictures and computer software. To copy this work you must get permission from the owner of the legal right. |
| download | the transfer of files or software from a remote computer to your computer |
| Children's Online Privacy Protection Act | a law that requires site owners to help protect the privacy of kids 13 and younger. Site owners are required to post and explain the elements of the privacy policy they are using. |
| phishing | the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft |
| identity theft | stealing the identity of others by using their credit card, driver’s license, social security or other personal identification numbers |
| meta-search engine | type of search tool that scans multiple search engines at once and provides results based on keywords submitted |
| spyware | software that secretly gathers information about a person or that is designed to take control of a computer’s operation without the knowledge of its user |
| piracy | the act of stealing valuable property by copying software, music, graphics/pictures, movies and books |
| plagiarism | copying someone else’s work and pretending that you wrote it |
| privacy policy | a statement on a website describing what information about you is collected by the site and how it is used |
| screen name | the name you call yourself when you communicate online |
| search engine | a function that lets you search for information and websites with keywords you specify |
| virus | a computer program created to cause damage to other computers. It can erase files or change a computer’s hard disk causing damage. |
| ethics | moral beliefs and rules about right and wrong |
| World Wide Web | a collection of documents and applications residing on Internet servers around the world |
| private identity information | information about yourself that you should not share online because it can be used for identity theft. Examples include your full name and your email address. |
| personal information | information about yourself that may reveal interests or facts about yourself but cannot be used to identify you. Examples include your age, gender, or favorite team. |
| spam | unwanted commercial email messages sent to thousands of recipients at a time |
| malware | software created to damage your personal files or your computer, or steal your private identity information. A computer virus is an example. |
| Internet chain letter | an email message that has been forwarded to you and asks that you forward it to people you know |
| cyberbullying | Intentional and repeated use of cell phone or computer networks to cause harm or distress to other kids |
| hacking | getting into a computer without permission |