A | B |
antivirus software | software that dedects viruses & repairs files |
application level gateways | proxies - uses software applications to view data before it passes through the firewall |
browser hijacking | software that changes your Internet Explorer settings |
circuit level gateways | firewall that only allows data into the network based on data requested from the network |
close | exit program or file |
copy | duplicate of data in a document |
cut | remove data from a document |
dictation mode | enables user to dictate text into a computer application |
discrete speech | speech recognition system that requires user to pause momentarily between each word |
ellipsis | three dots that indicate another dialog box will be opened |
favorites/bookmarks | websites the user can store & visit by clicking on the name of the site |
firewalls | piece of hardware or software that examines data passing into the computer or network & discards it if it does not meet certain criteria |
history | listing of websites that the user has been to in the past few days |
home page | first page that is opened in the browser |
identity theft | person uses someone else's identification documents in order to impersonate that person |
literal search engines | search using Boolean operators to narrow the search of sites |
maximize | make the window fill up the entire screen |
minimize | shrink the window down to the taskbar |
natural language search engines | searches are completed by typing in complete sentences |
netiquette | network etiquette - do's and don'ts of online communication |
packet filtering firewall | compares the incoming data to a list of rules prepared for the destination it is intended for |
paste | insert cut or copied data into a document |
plug and play | hardware will run as soon as it is plugged into the computer (mice, storage devices, printers) |
search engines | sites on the web that are designed to help people find information stored on other sites |
secure website | website that uses data encryption to keep all information protected |
spyware | technology that gathers information about a computer user without their permission or knowledge |
stateful inspection | a packet filter firewall that examines more than just the address and port information |
wireless networking | technology that enables two or more computers to communicate without wires |