| A | B |
| Virus | Computer program to damage files |
| Trojan Horse | computer virus disguised as a useful program |
| Worm | Computer file that goes through a computer and/or network to do damage |
| Standalone | Computer not using a network or server |
| AUP | Acceptable Use Policy |
| Acceptable Use Policy | Set of rules to regulate internet use |
| Attachment | separate document sent with email |
| Boolean operators | Connecting terms AND, OR, or NOT used to search criteria |
| Browser | Software to view World Wide Web resources |
| Search Engine | Software that gathers info from a database based on keywords |
| Cookies | Small text files that allow site's server to retrieve user's information |
| email | sending and receiving messages through a modem |
| Host | computer connected directly to the internet |
| Domain Name | name of the host computer |
| Internet | global network of thousands of computer networks |
| Keyword | Reference point used to describe content on a web page |
| Links | connections that bridge two images, pages, or words through a highlighted word or phrase |
| Modem | device for computer to transmit and receive data over telephone lines |
| search strategies | Ways to begin a search for data on the internet |
| telecommunications | electronic messaging between two computers |