A | B |
Active Content | Small program that gets installed on a computer while browsing the Internet. The basic function is to provide an interactive Internet experience through videos and toolbars. Sometimes is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it. |
Back Up | To make a duplicate copy of a program, a disk, or data. |
Cache Memory | Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet. |
Computer Privacy | Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission. |
Computer Security | The protection of a computer system and its data from accidental or intentional loss and tampering. |
Cookie | A small file on a computer that is created when a user visits a Web site. A Web site uses this to identify users who visit the site, and also track the preferences of the users. |
Copyright | A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law. |
Cyberbullying | Is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. |
Decryption | The process of reconverting the encrypted data into a readable and usable form. |
Encryption | The process of converting data into an unreadable and unusable form. Is done to prevent unauthorized access of data, especially during data transmission over the Internet. |
Firewall | A filter that blocks unreliable information from the Internet before it reaches your computer or a private network. It provides additional protection against threats such as hackers and viruses. Also helps to ensure computer privacy by restricting external access by any unauthorized user. |
Hacker | A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer. |
Intellectual Property | Any information available on the Internet which is legally owned by the person who created it. The owner has the exclusive rights to control the use of this information. |
Internet Service Provider (ISP) | A company that provides Internet connectivity to individuals, businesses, and organizations. |
Libel | Written defamation that has been published. Punishable offense. |