| A | B |
| Anti-virus software | Software that detects viruses and repairs files |
| Application level gateways | Also known as Proxy. – Similar to an application gateway, but uses software applications to view the data before it passes through the firewall. |
| Browser hijacking | Software that changes your Internet Explorer settings |
| Circuit level gateways | A firewall that only allows data into the network based on the data that was requested from the network |
| Close | To exit the program or file |
| Copy | When you make a duplicate of data in a document. |
| Cut | When you remove data from a document |
| Dictation mode | Enables users to dictate text into a computer application |
| Discrete speech | Speech recognition system that requires the user to pause momentarily between each word. |
| Ellipsis | Three dots (...) that indicate another dialog box will be opened. |
| Favorites/bookmarks | Websites that the user can store and visit by clicking on the name of the site. |
| Firewalls | A piece of hardware or software that examines data passing into the computer or network and discards it if it does not meet certain criteria. |
| History | The listing of websites that the user has been to in the past few days |
| Home page | The first page that is opened in the browser |
| Identity theft | Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason. |
| Literal search engines | Search using Boolean operators to narrow the search of sites. Searches are based on the words that the user enters. |
| Maximize | To make the window fill up the entire screen |
| Minimize | To shrink the window down to the taskbar. |
| Natural language search engines | Searches are completed by typing in complete sentences. Searches are based on key words in the sentence. |
| Netiquette | Network etiquette – The do’s and don’ts of online communication. |
| Packet filtering firewall | This firewall compares the incoming data to a list of rules prepared for the destination it is intended for. |
| Paste | To insert cut or copied data into a document |
| Plug and Play | Indicates that the hardware will run as soon as it is plugged into the computer. Most of these are mice, storage devices, and printers. |
| Search engines | Sites on the web that are designed to help people find information stored on other sites. |
| Secure website | A website that uses data encryption to keep all information protected. |
| Spyware | Technology that gathers information about a computer user without their permission or knowledge. |
| Stateful inspection | A packet filter firewall that examines more than just the address and port information. |
| Wireless networking | Technology that enables two or more computers to communicate without wires. |