| A | B |
| Digital Etiquette | electronic standards of conduct or procedure. |
| Digital Citizenship | the rules of good citizenship online including what one sees, says, and produces. |
| Acceptable Use Policy (AUP) | a policy that a network access user must agree to follow in order to be provided with access service. |
| Digital Footprint | the trail left by one’s interactions in a digital environment. |
| email | electronic communication system that sends and receives messages over the internet. |
| attachment | a file that is sent by email. |
| spam | junk email |
| Hacker | A computer hobbyist who tampers with systems to find mistakes and weaknesses. |
| Virus | A program whose purpose is to damage or destroy computer data, cause a computer to behave in unexpected ways, or interfere with the operation of a network, all while concealing and replicating itself. |
| Phishing | A method by which cyber criminals lure users into revealing account codes and passwords by pretending to be a legitimate web site. |
| Identity Theft | The taking of another person’s identity for the purpose of committing illegal acts. |
| Computer (Computer System) | A machine that changes information from one form into another by performing input, processing, output, and storage. |
| Server | A computer that manages data and programs used in a network. |
| Processing | A task a computer carries out with data. |
| Storage | memory used to store data |
| Central Processing Unit (CPU) | A piece of the computer’s hardware that processes and compares data and completes arithmetic and logical operations. The part of the computer that processes information. |
| Software | a program that tells the computer what to do |
| Network | Two or more computers connected to each other to share resources. |
| Hardware | the physical parts of the computer |