Internet Vocabulary

Status
Not open for further replies.

GigaBot

Administrator
Discussion on some other Topic on this Forum, gave me an inspiration, that it might be good that we have here, Our small Internet Vocabulary, just to shortly explain the meanings of some of the most used terms related to the Internet generally. We can all Google for that and find it ...but why not have it here. I found an interesting Glossary of Terms on the Website InternetSafety101.org and here it is:


A

Adware: A form of malicious code that displays unsolicited advertising on your computer.

Anti-virus Software: Software that attempts to block malicious programs/code/software (called viruses or malware) from harming your computer.

B

Blog/Blogging (short for weblog): A diary or personal journal kept on a website. Blogs are usually updated frequently and sometimes entries are grouped by specific subjects, such as politics, news, pop culture, or computers. Readers often post comments in response to blog entries.

Bookmark:Browser: A program that lets you find, see, and hear material on web pages. Popular browsers include netscape navigator, safari, Microsoft internet Explorer, Firefox, and chrome.

Buddies (Buddy list): A list of friends a user interacts with online through various media such as instant messaging (IM) and chat.

C

CDA: Chatroom: A location online that allows multiple users to communicate electronically with each other in real time, as opposed to delayed time as with e-mail.

Circumventor Sites: Parallel websites that allow children to get around filtering software and access sites that have been blocked.

Closed Systems:Cookie: A piece of information about your visit to a website that some websites record automatically on your computer. By using a cookie, a website operator can determine a lot of information about you and your computer. cookies are not always bad. For example, a cookie remembers that you prefer aisle seats in the front of the plane.

COPA:COPPA:
CIPA:
Cyberbullies/cyberbullying: Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).

Cybercrime: Any internet-related illegal activity.

Cybersecurity: Any technique, software, etc., used to protect computers and prevent online crime.

Refers to virtual sexual encounters between two or more persons.

Cyberstalking: Methods individuals use to track, lure, or harass another person online.

D

Discussion Boards: Also called internet forums, message boards, and bulletin boards. These are online sites that allow users to post comments on a particular issue.

Domain name: The part of an internet address to the right of the final dot used to identify the type of organization using the server, such as .gov or .com.

Download: To copy a file from one computer system to another via the internet (usually your computer or mobile device).

E

Electronic Footprint:Electronic mail (e-mail): An electronic mail message sent from one computer or mobile device to another computer or mobile device.

F

Favorite(s):
File Sharing:
This software enables multiple users to access the same computer file simultaneously. File sharing sometimes is used illegally to download music or software.

Filter/Filtering: Allows you to block certain types of content from being displayed. some of the things you can screen for include course language, nudity, sexual content, and violence. Different methods to screen unwanted Internet content include whitelisting, blacklisting, monitoring activity, keyword recognition, or blocking-specific functions such as e-mail or instant messages (iM). Filtering options are available through parental control software.


Firewall: A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer.

Flame: A hostile, strongly worded message that may contain obscene language.

G

Gamer tag: The nickname a user has chosen to be identified by when playing Internet games.

Gaming: Internet games, which can be played either individually or by multiple online users at the same time.

Griefers: Internet gamers who intentionally cause problems and/or cyberbully other gamers (i.e., individuals who play online games).

Grooming: Refers to the techniques sexual predators use to get to know and seduce their victims in preparation for sexual abuse.

H

Hardware: A term for the actual computer equipment and related machines or computer parts.

History: A tracking feature of Internet browsers that shows all the recent websites visited.

Homepage: The site that is the starting point on the web for a particular group or organization.

I

Identity Theft:Instant message/messaging (IM): Private, real-time text conversation between two users.

Internet (net): A giant collection of computer networks that connects people and information all over the world.


Internet Relay Chat (IRC): A multi-use live chat facility. IRC is an area of the Internet comprising thousands of chat rooms. IRC is run by IRC servers and requires client software to use.

Internet Service Provider (ISP): A generic term for any company that can connect you directly to the Internet.

J

Jpeg (Joint Partner experts group or Joint Photographic experts group): A popular file format for graphic images on the Internet.

M

Malware: Mobile web: The World Wide Web as accessed from mobile devices such as cell phones, PDAs, and other portable gadgets connected to a public network. Access does not require a desktop computer.

Modem: A device installed in your computer or an external piece of hardware that connects your computer to the Internet through a phone or cable line and allows communication between computers.


Monitoring Software: Software products that allow parents to monitor or track the websites or e-mail messages that a child visits or reads.

Mouse: A small hand-controlled device for pointing and clicking to make selections on the screen.

N

Netiquette: Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).

P

Password: A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.

Parental controls: specific features or software that allow parents to manage the online activities of children.

Peer-to-Peer (P2P) computing: A method of sharing files directly over the internet from one Internet-enabled device to another (computer, mobile phone, etc.), without being routed through a server.

Phishing: A scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.

Post: To upload information to the Web.

R

Real-time:S

Search engine: An Internet service that helps you search for information on the web.

Sexting: SMS:Social Networks: Online communities where people share information about themselves, music files, photos, etc. There are many social networking websites (e.g., Myspace, Facebook, or Friendster).

Software: A program, or set of instructions, that runs on a computer.

Spam: Any unsolicited e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.

Spyware: Surfing: Similar to channel surfing on a television, Internet surfing involves users browsing around various websites following whatever interests them.

T

Texting: A method of sending short messages (also called SMSes, txts, or text messaging) between mobile phones and other computer-enabled devices.

Twitter:U

Uniform Resource Locator (url): The address of a site on the internet. For example, the uRL for the White house is: www.whitehouse.gov. Each URL is unique and there are millions of them.

Upload: To send information from your computer to another computer.

Username: The name a user selects to be identified on a computer, on a network, or in an online gaming forum.

V

Videocam (webcam): Video cameras that are often attached to a computer so that a video image can be sent to another while communicating online.

Virus:W

Wireless computers: Many networks now allow computers access to the Internet without being connected with wires. These networks are becoming increasingly more popular and powerful, allowing people to access the internet using cell phones and other devices.

World Wide Web (www or web): A hypertext-based navigation system on the internet that lets you browse through a variety of linked resources, using typed commands or clicking on hot links.
 

Genesis

Administrator
Staff member
Thanks Misharnet. What we'll do is make it a reference sticky thread. If you wish to add to it, please PM me otherwise the thread may attract spam posts.

- closed -
 
Status
Not open for further replies.