A | B |
antivirus software | Software that detects viruses and repairs files. |
browser hijacking | Software that changes your Internet Explorer settings. |
close | To exit the program or file. |
cut | When you remove data from a document. |
discrete speech | Speech recognition system that requires the user to pause momentarily between each word. |
favorites | Websites that the user can store and visit by clicking on the name of the site. |
firewalls | A piece of hardware or software that examines data passing into the computer or network and discards it if it does not meet certain criteria. |
home page | The first page that is opened in the browser. |
literal search engines | Search using Boolean operators to narrow the search of sites. Searches are based on the words that the user enters. |
minimize | To shrink the window down to the taskbar. |
netiquette | Network etiquette – The do’s and don’ts of online communication. |
paste | To insert cut or copied data into a document. |
search engines | Sites on the web that are designed to help people find information stored on other sites. |
spyware | Technology that gathers information about a computer user without their permission or knowledge. |
wireless networking | Technology that enables two or more computers to communicate without wires. |
federal trade commission act | a federal law that protects from deceptive trade practices. |
pop up blocker | This can be configured to allow or not allow certain sites to pop up windows. This is especially useful for sites where the email may pop up in another window. |
application level gateways | Also known as Proxy. – Similar to an application gateway, but uses software applications to view the data before it passes through the firewall. |
circuit level gateways | data is only allowed into the network based on requests that were sent out of the network. The firewall remembers the requests, and matches them with the incoming data. |
copy | When you make a duplicate of data in a document. |
dictation mode | Enables users to dictate text into a computer application. |
ellipsis | Three dots (...) that indicate another dialog box will be opened. |
bookmarks | Websites that the user can store and visit by clicking on the name of the site. |
history | The listing of websites that the user has been to in the past few days. |
identity theft | Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason. |
maximize | To make the window fill up the entire screen. |
natural language search engines | Searches are completed by typing in complete sentences. Searches are based on key words in the sentence. |
packet filtering firewall | This firewall compares the incoming data to a list of rules prepared for the destination it is intended for. |
plug and play | Indicates that the hardware will run as soon as it is plugged into the computer. Most of these are mice, storage devices, and printers. |
secure website | A website that uses data encryption to keep all information protected. |
stateful inspection | A packet filter firewall that examines more than just the address and port information. |
Computer fraud and abuse act | a federal law that covers any |
electronic communications privacy act | a federal law that makes it unlawful for companies to violate the security of personal information. |
identity theft | Any instance where a person uses someone else’s identification documents or other identifiers in order to impersonate that person for any reason. |