| A | B | 
| antivirus software | Software that detects viruses and repairs files. | 
| browser hijacking | Software that changes your Internet Explorer settings. | 
| close | To exit the program or file. | 
| cut | When you remove data from a document. | 
| discrete speech | Speech recognition system that requires the user to pause momentarily between each word. | 
| favorites | Websites that the user can store and visit by clicking on the name of the site. | 
| firewalls | A piece of hardware or software that examines data passing into the computer or network and discards it if it does not meet certain criteria. | 
| home page | The first page that is opened in the browser. | 
| literal search engines | Search using Boolean operators to narrow the search of sites.  Searches are based on the words that the user enters. | 
| minimize | To shrink the window down to the taskbar. | 
| netiquette | Network etiquette – The do’s and don’ts of online communication. | 
| paste | To insert cut or copied data into a document. | 
| search engines | Sites on the web that are designed to help people find information stored on other sites. | 
| spyware | Technology that gathers information about a computer user without their permission or knowledge. | 
| wireless networking | Technology that enables two or more computers to communicate without wires. | 
| federal trade commission act | a federal law that protects from deceptive trade practices. | 
| pop up blocker | This can be configured to allow or not allow certain sites to pop up windows.  This is especially useful for sites where the email may pop up in another window. | 
| application level gateways | Also known as Proxy.  – Similar to an application gateway, but uses software applications to view the data before it passes through the firewall. | 
| circuit level gateways | data is only allowed into the network based on requests that were sent out of the network.  The firewall remembers the requests, and matches them with the incoming data. | 
| copy | When you make a duplicate of data in a document. | 
| dictation mode | Enables users to dictate text into a computer application. | 
| ellipsis | Three dots (...) that indicate another dialog box will be opened. | 
| bookmarks | Websites that the user can store and visit by clicking on the name of the site. | 
| history | The listing of websites that the user has been to in the past few days. | 
| identity theft | Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason. | 
| maximize | To make the window fill up the entire screen. | 
| natural language search engines | Searches are completed by typing in complete sentences.  Searches are based on key words in the sentence. | 
| packet filtering firewall | This firewall compares the incoming data to a list of rules prepared for the destination it is intended for. | 
| plug and play | Indicates that the hardware will run as soon as it is plugged into the computer.  Most of these are mice, storage devices, and printers. | 
| secure website | A website that uses data encryption to keep all information protected. | 
| stateful inspection | A packet filter firewall that examines more than just the address and port information. | 
| Computer fraud and abuse act | a federal law that covers any | 
| electronic communications privacy act | a federal law that makes it unlawful for companies to violate the security of personal information. | 
| identity theft | Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason. |