A | B |
Anti-virus software | Software that detects viruses and repairs files |
Application level gateways | Also known as Proxy. – Similar to an application gateway, but uses software applications to view the data before it passes through the firewall. |
Browser hijacking | Software that changes your Internet Explorer settings |
Circuit level gateways | A firewall that only allows data into the network based on the data that was requested from the network |
Close | To exit the program or file |
Copy | When you make a duplicate of data in a document. |
Cut | When you remove data from a document |
Dictation mode | Enables users to dictate text into a computer application |
Discrete speech | Speech recognition system that requires the user to pause momentarily between each word. |
Ellipsis | Three dots (...) that indicate another dialog box will be opened. |
Favorites/bookmarks | Websites that the user can store and visit by clicking on the name of the site. |
Firewalls | A piece of hardware or software that examines data passing into the computer or network and discards it if it does not meet certain criteria. |
History | The listing of websites that the user has been to in the past few days |
Home page | The first page that is opened in the browser |
Identity theft | Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason. |
Literal search engines | Search using Boolean operators to narrow the search of sites. Searches are based on the words that the user enters. |
Maximize | To make the window fill up the entire screen |
Minimize | To shrink the window down to the taskbar. |
Natural language search engines | Searches are completed by typing in complete sentences. Searches are based on key words in the sentence. |
Netiquette | Network etiquette – The do’s and don’ts of online communication. |
Packet filtering firewall | This firewall compares the incoming data to a list of rules prepared for the destination it is intended for. |
Paste | To insert cut or copied data into a document |
Plug and Play | Indicates that the hardware will run as soon as it is plugged into the computer. Most of these are mice, storage devices, and printers. |
Search engines | Sites on the web that are designed to help people find information stored on other sites. |
Secure website | A website that uses data encryption to keep all information protected. |
Spyware | Technology that gathers information about a computer user without their permission or knowledge. |
Stateful inspection | A packet filter firewall that examines more than just the address and port information. |
Wireless networking | Technology that enables two or more computers to communicate without wires. |