A | B |
Search | Using an online resource, such as a database, to find citations, abstracts, or full-text articles on a subject |
Hyperlink | A link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image |
Online | Controlled by or connected to another computer or to a network. |
Wifi | a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet |
Bandwidth | a data transmission rate; the maximum amount of information (bits/second) that can be transmitted along a channel |
Internet | a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange |
World Wide Web | computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol |
Web Browser | a program used to view HTML documents |
URL | the address of a web page on the world wide web |
Server | a computer that provides client stations with access to files and printers as shared resources to a computer network |
Refresh | to reload a web page or tab |
Blog | a shared on-line journal where people can post diary entries about their personal experiences and hobbies |
ISP | an organization that provides access to the Internet for a fee |
Bookmarks | Record the address of (a Web site, file, etc.) for quick access by a user |
Browse | an act of casual looking or reading |
Cache | RAM memory that is set aside as a specialized buffer storage that is continually updated |
Cookie | a short line of text that a web site puts on your computer's hard drive when you access the web site |
Download | transfer a file or program from a central computer to a smaller computer or to a computer at a remote location |
Host | a computer that provides client stations with access to files and printers as shared resources to a computer network |
Domain Name | strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet |
Antivirus | software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses |
Cybercrime | crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs |
Encryption | the activity of converting data or information into code |
Hackers | a programmer for whom computing is its own reward; may enjoy the challenge of breaking into other computers but does no harm |
Online Storage | A file hosting service, online file storage provider or cyberlocker |
Phishing | The fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information |
Shareware | Software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested |
Security Patches | A patch is a piece of software designed to fix problems with, or update a computer program or its supporting data |
Trojan Horse Virus | a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer |
Worms | a self-replicating malware computer program |