| A | B |
| Adware | computer software that displays advertisements |
| Application | also called an "app," it is computer software created for a particular task |
| Blog | a website that is regularly updated and operates like a journal with writing, |
| Cell tower | a site containing antennas and other electronic communications equipment that makes up a cell in a cellular network |
| Central Processing Unit - CPU | the central processing unit carries out the functions in a computer |
| Cloud computing | a computer network that allows for software and hardware to be placed on it |
| Cookie | a packet of data sent by an Internet server to a browser |
| copyright | exclusive rights given to someone who creates original work |
| coverage area | refers to the area in which a service provider offers its communication service |
| Cyberbullying | using technology to harm others through deliberate, repeated, and hostile attacks |
| dead zone | an area where a cell phone does no treceive a signal |
| digital addiction | a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers |
| Digital security certificate | a certificate given to websites that verifies whether a website is secure or not |
| domain name | a type of internet address such as .gov for government, .edu for educational institutions, .com for commercial sites, etc. |
| downloading | receiving data,such as a music or video file ,from a server or another computer system |
| E-mail | electronic mail sent between computer networks |
| E. reader | a device or computer program used for reading electronic books |
| hacked | your computer or computer network has been broken into without your permission |
| Hard drive | the physical parts of a computer |
| Hosting service | a service that provides access to the Internet through servers |
| HTTP | group of rules and functions that is used to transfer data overthe World Wide Web; it is required before a web address in a URL |
| HTTPS | a secure site used to transfer data like credit cards, important private information |
| Identity theft | fraud where one person assumes the identity of another person |
| Intellectual property | property created from an original thought or idea |
| interference | refers to any disruption of a signal in cell phones |