Glossary

a b c d e f g h i j k l m n o p q r s t u v w x y z
A:
Adware delivers advertisements to your computer, or other content that's pushing you to buy goods or services.
adware
All the things (tools) that help you do stuff on your computer, smartphone or mobile device. Can also be called software or programs.
applications
A short word for applications.
apps
B:
To ‘back-up’ data means to make a copy of your data — all your files including your music, photos, movie clips, text files, and games.
back-up
When you block a person it means they can’t be your friend, contact you, or be on your contacts list.
block
A blog (from web log) is where people can add their comments or ideas about a subject. Some blogs are like personal diaries. A blog can have text, images and links to other blogs. Anyone can create a blog.
blog
A jargon term for a collection of zombie computers — a string of compromised computers attached to the internet that can be used to send out spam or launch a ‘denial of service’ attack.
botnet
A type of internet connection that is faster than dial up.
broadband
An application that lets you use the internet. Some common ones are internet Explorer, Mozilla Firefox and Safari.
browser
C:
A place on your computer that remembers what you do so you can get to it faster next time.
cache
A disc where you can store data from your computer. CD stands for compact disc.
CD
Looks like a CD. Usually games or software come on a CD ROM. CD-ROM stands for compact disc read-only memory.
CD-ROM
A machine that stores lots of stuff (data) and lets you do a lot of things (using software and applications).
computer
A list of people's names and email addresses, and usually people using the same site or application as you.
contacts list
Websites leave things called cookies on your computer so they can remember stuff about you (like your name, password, or preferences) for your next visit.
cookie
A legal protection for people who express ideas and information in various forms — writing, music, movies and still images.
copyright
Web crawlers or web spiders are automated programs that browse the web to collect information (like your email addresses) or to track the sites you have visited.
crawler
A system that allows authors, artists, scientists, musicians and others to mark their work with the freedoms they want it to carry — a way of licensing the use of work.
Creative Commons
Using digital technology and the internet to bully.
cyberbullying
Keeping yourself, your computer and other devices, and all your data safe when you use the internet.
cybersecurity
D:
All the bits of information on your computer, including your photos, music, movies, and work.
data
A thing you need to do an activity like play music or take photos. Also things you add to your computer, like a printer, keyboard, or modem. So a mobile device can be a mobile phone, a smartphone, a PDA (like a Blackberry) or an iPhone.
device
A digital certificate is the way for you to find out the true identity of a site, and know if a site is legitimate.
digital certificate
Everything you ever post online, because content stays on the web forever.
digital footprint
Anything you take from the internet and put on your computer... including a picture or image, music clip, game, application or document.
downloads
A type of disc that holds lots of stuff (data) from and for your computer, not just movies! DVD stands for digital versatile disc.
DVD
E:
Electronic mail; using a computer or mobile device, emailing is a way to send texts and other data to and from people all over the world.
email
A security process that puts files into a secret code for transmitting. It's extremely unlikely that encrypted data will be intercepted by a third party.
encryption
See cybersecurity; keeping yourself, your computer and other devices, and all your data safe when you use the internet.
e-security
F:
Where you store stuff (chunks of information or data) on your computer.
files
Allowing other users to share files from your computer over the internet.
file-sharing
A way to sort out the stuff you do want on your computer, and the stuff you don't want. Email filtering helps to sort emails you might want (sent by people you know) from spam (junk emails or emails from people you don't know). Content filtering (such as a web filter) will block access to certain websites.
filtering
A barrier to stop people hacking into (getting into) your computer from the web; a barrier to control data coming to and leaving your computer.
firewall
A thing you use to save and store stuff (data). Sometimes called a USB.
flash drive
Websites like Facebook and MySpace. Also called social networking sites.
friend sites
G:
Playing a game, including a video game, online game or role-playing game.
gaming
A process that tags photos or clips as you create them with location information from a GPS.
geotagging
A system that gives you location information. Stands for global positioning system.
GPS
H:
Someone who gets access to a computer or computer system without permission.
hacker
When a person gets into your computer or your online accounts without your permission.
hacking
The area covered by one or more wi-fi access points.
hotspot
If an address bar begins ‘https’, the connection between your computer and the site will be encrypted. The most widely used security protocol is SSL (Secure Socket Layer).

https

I:
Your identity — your real name, user name and passwords, and other personal details.
ID
Where a person uses someone else's identity or a faked identity to commit a crime.
Identity crime
Where your personal details get used by someone else without your permission.
ID theft
Where a person uses someone else's personal details (without their permission) to make money or gain some sort of benefit.
ID fraud
How computers from all around the world share information (data), like texts, music, movies, emails, games, activities and lots more.

internet

J:
Usually called spam, these are bad emails from people you don't know who promise things that aren't for real. Mostly they are just to trick you. If you do as they say (by clicking, or opening attachments) they can put a nasty onto your computer, like a virus or spyware.

junk emails

 

K:
A Trojan or software that records every computer keystroke to capture personal details, including passwords.
keylogger
L:
M:
Malware is any malicious or bad software — for example, a computer virus, spyware, Trojan horse, worm. Malware can come from a bad link, bad attachment or dodgy download.
malware
Taking two or more bits of video and / or audio, then editing them together to make something new.
mashup
A mobile phone but also a PDA or a Blackberry.
mobile
N:
O:
When your computer or mobile device is connected to the internet.
online
P:
P2P stands for peer-to-peer file-sharing programs. P2P is a way of joining computers together, all over the world.
P2P
A browser padlock is a symbol to show that a website has a digital certificate.
padlock
A secret code made up by a user to protect their account, data or device.
password
Stands for personal digital assistant. A device you can hold in your hand that’s like a computer and a phone. You can use a PDA to get on to the internet.
PDA
What people know about you from what they can see online.
persona
A way of harvesting your personal information, where a hacker puts a code on your computer that redirects you to a fake site (like a fake bank site) when you think you are logging onto your real bank site
pharming
A hoax email designed to trick you into giving personal information or to ‘log in’. It may look like it comes from a bank or legitimate organisation.
phishing
The act of copying work (like songs, movies or TV shows) that is protected by copyright.
piracy
Taking someone’s work and representing it as your own.
plagiarise
Something that pops out of nowhere over a web page (usually a small window). It might be a banner with ads, or a special offer. Many popups will try to trick you, to make you click on a site.
popup
Posting online means putting content online: photos, videos, blog entries, comments etc.
post
A statement that tells you what will happen with your personal information.
privacy policy
Stuff about you (like information) that is nobody else’s business. Everyone has private stuff.
private
Q:
R:
Taking a soundtrack, video clip, image or graphic, and mixing it with other content to make new work.
remix
This means to tell someone about something that you think might be bad, or wrong, or dangerous. If anything bad or wrong happens when you are online, report it to your parents, carer or teacher. If it's something very bad, they will know who else to report it to.

report

 

S:
A dishonest trick designed to fool you into giving someone your money, passwords, personal details or other valuables. The scammers may do this with a promise or offer of something that isn’t real.
scam
A way to check things (like downloads) to see if they are safe for your computer.
scan
When you and your computer are safe from nasty things that can harm or damage.
secure
Ways to keep yourself and your computer safe.
security
New stuff that can make your computer and all your data even safer, and for dealing with new nasties online.
security updates
The way you choose to make something work, like your computer, web browser, instant messaging, or friend sites.
settings
Making sexual images or texts of yourself or your friends and sending them to others by mobile phone, email, a social networking site, or posting them on the web.
sexting
Slang for the all the small or hidden text that often includes legal or contract information, like ‘terms and conditions’, ‘terms of agreement’ or ‘privacy policy’.
small print
A small device that can be used both as a mobile phone and a computer, like an iPhone.
smartphone
Tricking a person into revealing sensitive information like a password or credit card details. Sometimes also called ‘grooming’.
social engineering
Online social networking means using the internet to keep in touch with friends and contacts, make new friends and contacts, and share information and content. Facebook and MySpace are social networking sites. Also called friend sites.
social networking
Software allows you to do things on your computer. Also called a program or application.
software
Like the internet’s junk mail. It’s an email or SMS, often from someone you don’t know. Usually spam tries to sell you something, or trick you into doing something. It may also ask for your personal details or money either in the email or on a website which the email directs you to.
spam
Web spiders or web crawlers are automated programs that browse the web to collect information (like your email addresses) or to track the sites you have visited.
spider
A nasty that you can be tricked into putting on your computer (by clicking a bad link). Spyware secretly learns stuff about you from your computer and gives it to someone you don’t know online.
spyware
Stands for Service Set Identifier. The SSID is the name given to identify a wi-fi network. The SSID is broadcast by the wireless router and can be detected by other wireless enabled devices that are within range.
SSID
Stands for Secure Socket Layer, the most widely used security protocol on the internet, used for online banking and shopping sites. The address of a secured webpage will begin ‘https’, instead of the usual ‘http’
SSL
Finding out things about other people by getting them to answer questions.
survey
T:
Rules you agree to when you sign up for a website. If you break these rules, your account may be shut down.
terms and conditions
A smaller picture of things like photos, or web pages.
thumbnail
A type of virus that can open your computer to being controlled by hackers.
Trojan
U:
A device you can use for saving stuff (data) from your computer, or moving data between different computers. Sometimes called a flash drive. USB stands for universal serial bus.
USB
V:
A program designed to infect and corrupt a computer. If a virus infects your computer it may start to delete files, or stop the operating system from running.
virus
A video blog.
vlog
W:
A person in a car with a portable computer or PDA, driving around looking for unsecured wi-fi or wireless networks.
wardriving
Computers from all around the world that use the internet to share information (data), like texts, music, movies, emails, games, activities and lots more.
web
A program that enables you to find, view and interact with web content — programs like Internet Explorer, Firefox, Safari or Chrome.
web browser
A wi-fi enabled device (like a laptop or PDA) will connect to the internet when it's within range of a wireless network connected to the internet.
Wi-Fi
A way to get onto the internet without using cables or wires.
wireless network
X:
Y:
Z: