ASTEC Internet Safety

24 terms by Mr_Eaton

Create a new folder

Advertisement Upgrade to remove ads

Phishing

An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies. Scammers copy legitimate websites and set up nearly identical pages.

Virus

A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.

worm

a self-replicating malware computer program, which uses a computer network to send copies of itself to other computers on the network.

spyware

a malware that collects small pieces of information about users without their knowledge.

adware

any software package which automatically plays, displays, or downloads advertisements to a computer.

Trojan horse

a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation, but steals information or harms the system.

Attachment

A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties

Blog

A Web log, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture. Blogs can be set up on social networking sites or on separate blogging websites, such as Xanga® and Blogger®.

Bookmark

A way to quickly access a favorite website by saving it in your browser

Browser

A program that allows users to view Web pages. Mozilla® Foxfire and Microsoft® Internet Explorer are examples of popular browsers.

Chat Room

An interactive forum where you can talk in real-time. The chat room is the place or location online where the chat is taking place. Many chat rooms are established so that people can discuss a common interest like music or movies.

Cookie

Websites use these files to store information on your browser, such as log-in or registration identification, user preferences, and online "shopping-cart" information. Your browser saves the information and reuses it when you return to those websites. You can refuse to accept cookies or erase all cookies saved on your browser.

Cyberbullying

Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones

Download

Information retrieved from the Internet, discs or CDs, and other computers which you can use or save to your computer

E-mail (electronic mail)

A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address.

Firewall

This is a system that creates a special "wall" to keep out unwanted information, like spam and viruses, and unwanted people, like hackers.

Hacker

A popular term for someone who accesses computer information either legally or illegally.

Netiquette

Courtesy, honesty, and polite behavior practiced on the Internet.

Pharming

An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.

Piracy

Illegally copying copyrighted software, music, or movies.

Spam

Unwanted e-mail from someone you don't know. It is usually trying to sell you something.

Social Networking Site

An online community where people from all over the world may meet and share common interests. These sites allow members to set up a profile, which may include information such as name, location, phone number, age, and gender. Often users will post pictures and videos

History

A list of websites the people using a particular computer have visited. Check your children's website history to see what sites they have visited.

Malware

The term "malware" covers all sorts of malicious software designed to harm a computer or network. Malware can be installed on your machine without your knowledge, often through deceptive links or downloads posing as something you might be interested in. Once malware has been installed on your computer, cyber criminals can sometimes try to access your personal information. They do this by logging your keystrokes or monitoring your computer's activity. Your computer could also be controlled and forced to visit websites, send spam email or perform other actions without your knowledge. The effects of malware can be anything from a brief annoyance to identity theft.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set