A | B |
Spam | Unsolicited Email sent to sell or advertise |
Virus | Software designed to damage or destroy a computer |
Spyware | Software designed to take over, track, or intercept computer information |
https | an interactive lock, and a seal that identifies a secure site |
Hyperlink | click on this to go to another page or place |
HTTP | underlying protocol used by the world wide web |
HTML | authoring language of web pages |
URL | the address of a web page. Uniform Resource Locator |
RSS | really simple syndication, text files |
spam | junk e-mail |
spim | junk e-mail in instant messaging |
search engine | site that lets you type in a keyword and search the web |
cookie | info about you that allows web pages to be customized to match your interests |
chatroom | virtual room where chatting takes place |
ethernet | commonly used to connect computers to networks |
hacker (good) | a computer enthusiast who likes to learn computer systems |
hacker (bad) | tries to gain unauthorized access to computer systems |
flaming | when a writer attcks another person in harsh and personal terms |
pharming | domain spoofing |
phishing | an e-mail that falsely claims to be an established enterprise to scam personal info |
byte | The smallest measure of storage capability is called a... |
Peripherals | scanners and printers |
output | Devices that are used to talk to the computer are called... |
1 Megabyte = | 1,000,000 bytes |
ROM | What kind of memory is permanent and contains the instructions for starting up a computer? |
RAM | What kind of memory is temporary and holds the image on the monitor? |
Spreadsheet | Which program would you use to create a graph? |
Word Processing | Which program would you use to create a report? |
Database | Which program would you use to create a form letter and send it to a everyone on a mailing list? |
Browser | a program used to view HTML documents |
Computer hardware | keyboards and monitors |
"trolls" | members of an online forum who use anonymous/fictitious identities or fraudulently pose as other people, for the sole purpose of spamming the community with inappropriate or irrelevant content/ |
TCP/IP | a set of rules (packets) that allows computers to “talk” to each other and send information back and forth. |
bandwidth | rate that information flows over the internet. |
Cloud Computing,  | whereby shared resources, software and information are provided to computers and other devices on-demand, |
WEB APPS,  | an application that is accessed over a network |
JavaScript | cripting language used to enable programmatic access to objects within both the client application and other applications |
AJAX | (Asynchronous JavaScript and XML) |
PLUG-INS | A program that adds a specific feature to a user's browser so it is able to play/view certain files. Examples: Flash, Shockwave |
BROWSER EXTENSIONS,  | Adds new functions to your browser |
synchronization | lets you save your browser settings online, in the cloud, so they aren’t lost and can be shared between computers |
Malware | is malicious software installed on your machine, usually without your knowledge. |
Three Sections of a URL,  | Scheme/Hostname/Path |
IP Address | A set of numbers that identifies a url in order to locate a device. |
DNS | This is a service that stores, translates, and retrieves the numerical address equivalents of familiar host names that you use everyday (such as the "www.4teachers.org" in http://www.4teachers.org) |
Extended Validation Indicators,  | gives you the information you need to help ensure that you’re not entrusting your information to a fake website |
OPEN SOURCE,  | of or relating to or being computer software for which the source code is freely available |