| A | B |
| Internet | Collection world-wide networked computer files connected by use of telecommunication devices.. |
| Intranet | Collection of networked computer files created by a company or an organization to share information. |
| Website | Collection of related and linked web pages. |
| Browser | a program that allows users to view web pages and online information |
| Internet Explorer | Microsoft Internet page viewer |
| Network | a bunch of computer connected together that share information |
| Windows Explorer | Navigation for local drive and neetwork drives |
| Satellite | Telecommunication device that sends data by bouncing signals |
| Modem | Hardware device that allows a electric data to be sent by telephone and cable service lines |
| Firewall | A security system designed to prevent unauthorized entry to a network. |
| Uniform Resource Locator | Naming system that allows web visitors to locate the exact resource they are looking for. |
| IP address | Number address for web pages on the Internet. |
| Domain name system | Converts the names people relate web addresses into IP addresses that computers work with. |
| Protocol | Language the computers uses to "speak" to one another on a network. |
| Synergy | The effect that a group effort can create. |
| LAN | A collection of computers on a network in the same geographical area. |
| Peer-to-Peer Network | All the workstations are equal & connected to each other through a network cable or a wireless signal. |
| Client/Server Network | Managed & secured by a network operating system. |
| WAN | A network that allows people to communicate, share information, & work together even if they are miles apart. |
| Routers | Network devices or programs that choose the best pathway for each packet. |
| Anonymity | The ability to keep oneself out of the public spotlight. |
| Cookie | A small file saved to your hard drive when you visit a Web site. It stores information about you so it is available when you return. |
| GUID | A unique identification number that is generated by a piece of hardware or by program. |
| Infringment | Breaking a copyright law by pretending that another person's work is yours. |
| Spoofing | A false Internet Protocol or e-mail address used by intruders to gain access to a network |
| Phishing | A special kind of scam used by criminals to try to get your personal information. |
| Trap Door | A secret way into the system. |
| Piracy | Illegal copies of programs. |
| Vandalism | Prank material used by criminals on an unprotected Web server. |
| Antivirus Programs | Programs used to protect computers from viruses. |
| Full Backup | Copy everything stored on your computer. |
| Packets | Information divided into tiny segments. |