Glossary
Adware delivers advertisements to your computer, or other content that's pushing you to buy goods or services.
adwareAll the things (tools) that help you do stuff on your computer, smartphone or mobile device. Can also be called software or programs.
applicationsA short word for applications.
appsTo ‘back-up’ data means to make a copy of your data — all your files including your music, photos, movie clips, text files, and games.
back-upWhen you block a person it means they can’t be your friend, contact you, or be on your contacts list.
blockA blog (from web log) is where people can add their comments or ideas about a subject. Some blogs are like personal diaries. A blog can have text, images and links to other blogs. Anyone can create a blog.
blogA jargon term for a collection of zombie computers — a string of compromised computers attached to the internet that can be used to send out spam or launch a ‘denial of service’ attack.
botnetA type of internet connection that is faster than dial up.
broadbandAn application that lets you use the internet. Some common ones are internet Explorer, Mozilla Firefox and Safari.
browserA place on your computer that remembers what you do so you can get to it faster next time.
cacheA disc where you can store data from your computer. CD stands for compact disc.
CD Looks like a CD. Usually games or software come on a CD ROM. CD-ROM stands for compact disc read-only memory.
CD-ROM A machine that stores lots of stuff (data) and lets you do a lot of things (using software and applications).
computer A list of people's names and email addresses, and usually people using the same site or application as you.
contacts list Websites leave things called cookies on your computer so they can remember stuff about you (like your name, password, or preferences) for your next visit.
cookie A legal protection for people who express ideas and information in various forms — writing, music, movies and still images.
copyright Web crawlers or web spiders are automated programs that browse the web to collect information (like your email addresses) or to track the sites you have visited.
crawler A system that allows authors, artists, scientists, musicians and others to mark their work with the freedoms they want it to carry — a way of licensing the use of work.
Creative Commons Using digital technology and the internet to bully.
cyberbullying Keeping yourself, your computer and other devices, and all your data safe when you use the internet.
cybersecurity All the bits of information on your computer, including your photos, music, movies, and work.
data A thing you need to do an activity like play music or take photos. Also things you add to your computer, like a printer, keyboard, or modem. So a mobile device can be a mobile phone, a smartphone, a PDA (like a Blackberry) or an iPhone.
device A digital certificate is the way for you to find out the true identity of a site, and know if a site is legitimate.
digital certificate Everything you ever post online, because content stays on the web forever.
digital footprint Anything you take from the internet and put on your computer... including a picture or image, music clip, game, application or document.
downloads A type of disc that holds lots of stuff (data) from and for your computer, not just movies! DVD stands for digital versatile disc.
DVD Electronic mail; using a computer or mobile device, emailing is a way to send texts and other data to and from people all over the world.
email A security process that puts files into a secret code for transmitting. It's extremely unlikely that encrypted data will be intercepted by a third party.
encryption See cybersecurity; keeping yourself, your computer and other devices, and all your data safe when you use the internet.
e-security Where you store stuff (chunks of information or data) on your computer.
files Allowing other users to share files from your computer over the internet.
file-sharing A way to sort out the stuff you do want on your computer, and the stuff you don't want. Email filtering helps to sort emails you might want (sent by people you know) from spam (junk emails or emails from people you don't know). Content filtering (such as a web filter) will block access to certain websites.
filtering A barrier to stop people hacking into (getting into) your computer from the web; a barrier to control data coming to and leaving your computer.
firewall A thing you use to save and store stuff (data). Sometimes called a USB.
flash drive Websites like Facebook and MySpace. Also called social networking sites.
friend sites Playing a game, including a video game, online game or role-playing game.
gaming A process that tags photos or clips as you create them with location information from a GPS.
geotagging A system that gives you location information. Stands for global positioning system.
GPS Someone who gets access to a computer or computer system without permission.
hacker When a person gets into your computer or your online accounts without your permission.
hacking The area covered by one or more wi-fi access points.
hotspot If an address bar begins ‘https’, the connection between your computer and the site will be encrypted. The most widely used security protocol is SSL (Secure Socket Layer).
https
Your identity — your real name, user name and passwords, and other personal details.
ID Where a person uses someone else's identity or a faked identity to commit a crime.
Identity crime Where your personal details get used by someone else without your permission.
ID theft Where a person uses someone else's personal details (without their permission) to make money or gain some sort of benefit.
ID fraud How computers from all around the world share information (data), like texts, music, movies, emails, games, activities and lots more.
internet
Usually called spam, these are bad emails from people you don't know who promise things that aren't for real. Mostly they are just to trick you. If you do as they say (by clicking, or opening attachments) they can put a nasty onto your computer, like a virus or spyware.
junk emails
A Trojan or software that records every computer keystroke to capture personal details, including passwords.
keylogger Malware is any malicious or bad software — for example, a computer virus, spyware, Trojan horse, worm. Malware can come from a bad link, bad attachment or dodgy download.
malware Taking two or more bits of video and / or audio, then editing them together to make something new.
mashup A mobile phone but also a PDA or a Blackberry.
mobile P2P stands for peer-to-peer file-sharing programs. P2P is a way of joining computers together, all over the world.
P2P A browser padlock is a symbol to show that a website has a digital certificate.
padlock A secret code made up by a user to protect their account, data or device.
password Stands for personal digital assistant. A device you can hold in your hand that’s like a computer and a phone. You can use a PDA to get on to the internet.
PDA What people know about you from what they can see online.
persona A way of harvesting your personal information, where a hacker puts a code on your computer that redirects you to a fake site (like a fake bank site) when you think you are logging onto your real bank site
pharming A hoax email designed to trick you into giving personal information or to ‘log in’. It may look like it comes from a bank or legitimate organisation.
phishing The act of copying work (like songs, movies or TV shows) that is protected by copyright.
piracy Taking someone’s work and representing it as your own.
plagiarise Something that pops out of nowhere over a web page (usually a small window). It might be a banner with ads, or a special offer. Many popups will try to trick you, to make you click on a site.
popup Posting online means putting content online: photos, videos, blog entries, comments etc.
post A statement that tells you what will happen with your personal information.
privacy policy Stuff about you (like information) that is nobody else’s business. Everyone has private stuff.
private Taking a soundtrack, video clip, image or graphic, and mixing it with other content to make new work.
remix This means to tell someone about something that you think might be bad, or wrong, or dangerous. If anything bad or wrong happens when you are online, report it to your parents, carer or teacher. If it's something very bad, they will know who else to report it to.
report
A dishonest trick designed to fool you into giving someone your money, passwords, personal details or other valuables. The scammers may do this with a promise or offer of something that isn’t real.
scam A way to check things (like downloads) to see if they are safe for your computer.
scan When you and your computer are safe from nasty things that can harm or damage.
secure Ways to keep yourself and your computer safe.
security New stuff that can make your computer and all your data even safer, and for dealing with new nasties online.
security updates The way you choose to make something work, like your computer, web browser, instant messaging, or friend sites.
settings Making sexual images or texts of yourself or your friends and sending them to others by mobile phone, email, a social networking site, or posting them on the web.
sexting Slang for the all the small or hidden text that often includes legal or contract information, like ‘terms and conditions’, ‘terms of agreement’ or ‘privacy policy’.
small printA small device that can be used both as a mobile phone and a computer, like an iPhone.
smartphoneTricking a person into revealing sensitive information like a password or credit card details. Sometimes also called ‘grooming’.
social engineeringOnline social networking means using the internet to keep in touch with friends and contacts, make new friends and contacts, and share information and content. Facebook and MySpace are social networking sites. Also called friend sites.
social networkingSoftware allows you to do things on your computer. Also called a program or application.
softwareLike the internet’s junk mail. It’s an email or SMS, often from someone you don’t know. Usually spam tries to sell you something, or trick you into doing something. It may also ask for your personal details or money either in the email or on a website which the email directs you to.
spamWeb spiders or web crawlers are automated programs that browse the web to collect information (like your email addresses) or to track the sites you have visited.
spiderA nasty that you can be tricked into putting on your computer (by clicking a bad link). Spyware secretly learns stuff about you from your computer and gives it to someone you don’t know online.
spywareStands for Service Set Identifier. The SSID is the name given to identify a wi-fi network. The SSID is broadcast by the wireless router and can be detected by other wireless enabled devices that are within range.
SSIDStands for Secure Socket Layer, the most widely used security protocol on the internet, used for online banking and shopping sites. The address of a secured webpage will begin ‘https’, instead of the usual ‘http’
SSLFinding out things about other people by getting them to answer questions.
surveyRules you agree to when you sign up for a website. If you break these rules, your account may be shut down.
terms and conditionsA smaller picture of things like photos, or web pages.
thumbnailA type of virus that can open your computer to being controlled by hackers.
TrojanA device you can use for saving stuff (data) from your computer, or moving data between different computers. Sometimes called a flash drive. USB stands for universal serial bus.
USBA program designed to infect and corrupt a computer. If a virus infects your computer it may start to delete files, or stop the operating system from running.
virusA video blog.
vlogA person in a car with a portable computer or PDA, driving around looking for unsecured wi-fi or wireless networks.
wardrivingComputers from all around the world that use the internet to share information (data), like texts, music, movies, emails, games, activities and lots more.
webA program that enables you to find, view and interact with web content — programs like Internet Explorer, Firefox, Safari or Chrome.
web browserA wi-fi enabled device (like a laptop or PDA) will connect to the internet when it's within range of a wireless network connected to the internet.
Wi-FiA way to get onto the internet without using cables or wires.
wireless network