How can we help?

You can also find more resources in our Help Center.

24 terms

ASTEC Internet Safety

STUDY
PLAY
Phishing
An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies. Scammers copy legitimate websites and set up nearly identical pages.
Virus
A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.
worm
a self-replicating malware computer program, which uses a computer network to send copies of itself to other computers on the network.
spyware
a malware that collects small pieces of information about users without their knowledge.
adware
any software package which automatically plays, displays, or downloads advertisements to a computer.
Trojan horse
a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation, but steals information or harms the system.
Attachment
A file that can be added to an e-mail, like a document, photograph, or song. Sometimes attachments carry viruses, so do not open attachments from unknown parties
Blog
A Web log, or blog, is an online journal or diary where writers, known as bloggers, may chronicle their daily lives or comment on news and popular culture. Blogs can be set up on social networking sites or on separate blogging websites, such as Xanga® and Blogger®.
Bookmark
A way to quickly access a favorite website by saving it in your browser
Browser
A program that allows users to view Web pages. Mozilla® Foxfire and Microsoft® Internet Explorer are examples of popular browsers.
Chat Room
An interactive forum where you can talk in real-time. The chat room is the place or location online where the chat is taking place. Many chat rooms are established so that people can discuss a common interest like music or movies.
Cookie
Websites use these files to store information on your browser, such as log-in or registration identification, user preferences, and online "shopping-cart" information. Your browser saves the information and reuses it when you return to those websites. You can refuse to accept cookies or erase all cookies saved on your browser.
Cyberbullying
Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones
Download
Information retrieved from the Internet, discs or CDs, and other computers which you can use or save to your computer
E-mail (electronic mail)
A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address.
Firewall
This is a system that creates a special "wall" to keep out unwanted information, like spam and viruses, and unwanted people, like hackers.
Hacker
A popular term for someone who accesses computer information either legally or illegally.
Netiquette
Courtesy, honesty, and polite behavior practiced on the Internet.
Pharming
An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
Piracy
Illegally copying copyrighted software, music, or movies.
Spam
Unwanted e-mail from someone you don't know. It is usually trying to sell you something.
Social Networking Site
An online community where people from all over the world may meet and share common interests. These sites allow members to set up a profile, which may include information such as name, location, phone number, age, and gender. Often users will post pictures and videos
History
A list of websites the people using a particular computer have visited. Check your children's website history to see what sites they have visited.
Malware
The term "malware" covers all sorts of malicious software designed to harm a computer or network. Malware can be installed on your machine without your knowledge, often through deceptive links or downloads posing as something you might be interested in. Once malware has been installed on your computer, cyber criminals can sometimes try to access your personal information. They do this by logging your keystrokes or monitoring your computer's activity. Your computer could also be controlled and forced to visit websites, send spam email or perform other actions without your knowledge. The effects of malware can be anything from a brief annoyance to identity theft.