| A | B |
| Barriers | Obstacles that interfere with the understanding of a message |
| Channels | Avenues through which messages are delivered |
| Communications | Process of exchanging messages between a sender and a receiver |
| Distractins | Things that compete with the message for the listeners attention |
| Emotional Barriers | Biases against the senders opinions that prevent a listener from understanding |
| Feedback | Receivers response to a message |
| Jargon | Specialized vocabulary used by members of a particular group |
| Settin | Circumstances under which communication takes place |
| Enumeration | Listing items in order |
| Generalization | Statement that is accepted as true by most people |
| Persuade | Process used to convince someone to change a perception in order to get them to do what you want |
| Communicatin Programs | software applications that enable users to electronically communicate through computers with people around the world. |
| Database Programs | Software applications that store and organize information. |
| Desktop Publixhing Program | Software application that is part word processor and part graphics application, and enables users to edit and manipulate both text and graphics in one document. |
| Graphics and design programs | Software applications for creating and modifying images. |
| Homepage | The main page of a Web site that clearly and quickly lets people know what sight they are visiting. |
| Hypertext Markup Language | Detailed code used to write Web pages. |
| Presentation software | Software application that produces slide shows or multimedia presentations. |
| Spreadsheet programs | Software applications used to organize, calculate, and analyze numerical data. |
| Word Processing programs | Software applications designed to create documents that are primarily text but may contain a few graphic. |
| Enterprise resource planning | Sophisticated software that integrates all parts of a companys business management. |
| firewall | Hardware or software that protects a computer from attacks by hackers |
| Hypertext Transfer Protocol | The global computer protocol used to identify and locate Web pages on the internet. |
| Internet | Worldwide network of computer networks, allowing a free flow of information. |
| Internet service providers | Companies that provide Internet access for businesses, organizations, and individuals. |
| Site Map | An outline of what can be found on each page within the Web site. |
| Unifrom Resource Locator | The address of a file that is available on the Internet, usually on the World Wide Web. |
| Wi-Fi | Technology that establishes a wireless fidelity Internet connection using radio frequencies. |