Term
|
Definition
A small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it. |
|
|
Term
|
Definition
The act or instance of making a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup. |
|
|
Term
|
Definition
Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet. |
|
|
Term
|
Definition
Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission |
|
|
Term
|
Definition
Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission |
|
|
Term
|
Definition
The protection of a computer system and its data from accidental or intentional loss and tampering. |
|
|
Term
|
Definition
A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users.
|
|
|
Term
|
Definition
A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users. |
|
|
Term
|
Definition
The process of reconverting the encrypted data into a readable and usable form. |
|
|
Term
|
Definition
The process of reconverting the encrypted data into a readable and usable form. |
|
|
Term
Encryption The process of converting data into an unreadable and unusable form. Encryption is done to prevent unauthorized access of data, especially during data transmission over the Internet. |
|
Definition
|
|
Term
Firewall A filter that blocks unreliable and unauthorized information from the Internet before it reaches your computer or a private network. It provides additional protection against threats such as hackers and viruses. A firewall also helps to ensure computer privacy by restricting external access by any unauthorized user. |
|
Definition
|
|
Term
Hacker A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer. |
|
Definition
|
|
Term
Intellectual Property Any information available on the Internet is an intellectual property, which is legally owned by the person who created it. The owner of an intellectual property has the exclusive rights to control the use of this information. |
|
Definition
|
|
Term
Internet Service Provider (ISP) A company that provides Internet connectivity to individuals, businesses, and organizations. |
|
Definition
|
|
Term
Libel Written defamation that has been published. Libel is a punishable offense. |
|
Definition
|
|
Term
Online Predator An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit them financially or involve them in dangerous relationships. |
|
Definition
|
|
Term
Password A unique string of characters that a user types in as an identification code. It is a security measure used to restrict access to computer systems and sensitive files. |
|
Definition
|
|