| A | B |
| Android | An operating system used on smartphones and tablets. |
| Antivirus
Application | Software that is used to detect and eliminate computer viruses. |
| Asynchronous
Communication | Communication that does not happen in real time. |
| Attribution | Giving credit to the author or owner for their work. |
| Bcc | A blind carbon copy (Bcc) is a method used in an email application to send a message while keeping
the identity of the receiver private. |
| Blog | An online journal that is commonly used to write about one's experiences, opinions, or to give a
review. |
| Bookmark | A way of saving a web page's address to reference or return to later. |
| Browser | An application used to access websites on the internet. |
| Browser History | A list of websites that have been visited on the internet; this includes any data associated with the
website and how long the user was on the website. |
| Cable Internet | Transmits data through a cable television network as a means to connect a computer to the
internet. |
| Cc | A carbon copy (Cc) is a method used in an email application to send a copy of the email to someone.
A Cc'd recipient is not required to respond to the message. |
| Citation | A means of giving credit to a source when their information is used. |
| Computer Ethics | A set of principles that help users determine what is right or wrong in regards to computers. |
| Computer Virus | A software program that is loaded onto a computer, and then duplicates itself, spreading and
infecting programs and files on the computer. |
| Creative Commons
License | A free license used by creators to permit others to use their content, free of charge, as long as they follow the license rules. |
| Cyberbullying | The deliberate use of harmful words or pictures to cause embarrassment, hopelessness, or to
intimidate another person online repeatedly. |
| Desktop
Interface | Icons and menus on the computer that allow the user to interact with the operating system. |
| DSL | A digital subscriber line (DSL) transmits data digitally over phone lines. |
| Email | A method of communication used to send electronic messages using the internet. |
| Ethernet Cable | The cable used to connect computers in a network. An Ethernet cable allows data to be transferred
from one computer to another computer. |
| Font | A typeset that has a particular face and size. |
| Hardware | Physical components of a computer system such as a keyboard, mouse, or modem. |
| HTML | Hypertext Markup Language (HTML) is used to mark a web page's structure using tags so that the
web browser displays the content correctly. |
| Instant
Messaging | A means of text transmission sent in real time over the internet. |
| Internet | A network of computers that provides access to information on the web. |
| Intranet | A restricted private network used by organizations to communicate. |
| Malware | A virus or Trojan horse designed to cause harm to a computer or device. |
| Modem | A device that translates analog carrier signals to encode and decode digital information. |
| Naming
Convention | A chosen method for organizing and naming files and folders. |
| Navigation
Tracking | A tool that provides directions using satellites. |
| Network | Computers that are connected through cable or Wi-Fi to share resources. |
| Network Adapter | Hardware that is used to connect a computer to another computer or server over a local area
network. |
| Online
Anonymity | The state of being anonymous online. |
| Open Source | Software that can be modified and distributed to others. |
| Operating
System | Software that manages all of the installed applications and hardware on a computer or device. |
| Page Orientation | How a document is displayed on a screen or in printed form. |
| Password | A secret set of characters that are used to access a computer system or service. |
| Personal Identifiable
Information | Information that can be used to distinguish or track a person's identity. |
| Phishing | A malicious attack that uses email, text messaging, and websites to gather sensitive information
about people. |
| Plagiarism | Using another person's work as your own. |
| Private Browsing | A way to access websites on the internet without being tracked. |
| Proprietary | Software that the owner maintains exclusive control over how it is modified and distributed. |
| Public Domain | Content that is not owned by any individual or company and that is free to use. |
| RAM | Random-access memory (RAM) uses volatile memory to store information as long as the computer
has a power source. |
| Repetitive Stress
Injuries | Repetitive motions that cause damage to muscles, nerves, and tendons in the body. |
| Reply | An email response method used to send a response to the original sender. |
| Reply All | An email response method used to send a response to everyone included in the original message. |
| ROM | Read-only memory (ROM) is volatile memory that stores information even without power. |
| Router | A device used to transmit data packets from one computer network to another. |
| Search Engine | Software used to search a database using keywords or phrases entered by the user. |
| Search Operators | Commands and special characters used to refine search engine results. |
| Session | The time a user spent on a website. The time (session) is used to measure that website's traffic. |
| Spyware | A malicious software program that spies on the user and shares the information with a third party. |
| Start Button | A button on a Windows operating system desktop that allows users to access computer programs,
files, and settings. |
| Synchronous
Communication | Communication that happens in real time. |
| Toolbar | An element on a computer's desktop where buttons, icons, menus, and other elements are placed. |
| Trojan Horse | A malicious program that is disguised as something else. Trojan horses may be used to steal or destroy data, crash systems, or replicate to other systems. |
| USB | A universal serial bus (USB) is used to connect devices like printers, keyboards, external storage, and
digital cameras to computers. |
| Video
Conference | A means of communication using video and audio to speak in real time with others over the
internet. |
| Virtual Assistant | An application that completes tasks based on the voice commands it is given by a user. |
| VPN | Virtual private network (VPN) is a computer network that can help create a secure connection to
the internet. |
| Wi-Fi | A wireless connection to the internet. |