| A | B |
| Application | also called an "app," it is computer software created for a particular task |
| Blog | a website that is regularly updated and operates like a journal with writing, |
| Cell tower | a site containing antennas and other electronic communications equipment that makes up a cell in a cellular network |
| CPU | the central processing unit |
| Cloud computing | a computer network that allows for software and hardware to be placed on it |
| copyright | exclusive rights given to someone who creates original work |
| coverage area | refers to the area in which a service provider offers its communication service |
| Cyberbullying | using technology to harm others through deliberate, repeated, and hostile attacks |
| dead zone | an area where a cell phone does no treceive a signal |
| digital addiction | a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers |
| domain name | a type of internet address such as .gov for government, .edu for educational institutions, .com for commercial sites, etc. |
| E-mail | electronic mail sent between computer networks |
| hacked | your computer or computer network has been broken into without your permission |
| Hard drive | the physical parts of a computer |
| Internet | a vast global computer network which links smaller computer networks together |
| IP address | a string of numbersthatindicatesthe location of a computer orserver; commonly referred to as a web address orURL |
| Malware | computer software designed to harm a computer |
| Multimedia | music on digital audio players content andmedia that combines different content forms,such astext, audio, animation, and still images |
| Open source | a way in which software is developed that allows accessto the source code of an application or software and is free to update and use |
| Operating system | a group ofsoftware programsthat provide instructions to a computerso thatitmay operate |
| Piracy | the unauthorized reproduction or copying ofmusic, video, orliterature without proper compensation or permission |
| Plagiarism | representing the language orthoughts of an author as your own, withoutindicating where the information is from |
| Search engine | a computer programthatlocatesinformation on the web |
| Service Provider | a company or organization that offers a service,such as web, cable television, or phone access |
| Signal strength | refersto the strength of a connection over a wireless (radio)telecommunication system |