How can we help?

You can also find more resources in our Help Center.

22 terms

2.0 Electronic Communication & Safety

STUDY
PLAY
Chatting
Talking in real-time to other network users from all parts of the world
Blogs
Are web-based journal/diary
Podcasting
A method of publishing files to the Internet allowing users to subscribe to a feed and receive new files automatically by subscription
Discussion boards
An online discussion board that provides a forum where users can post and respond to messages from other users and receive feedback from posted messages; usually aligned to a specific topic
Moderated
An administrator or moderator monitors discussion threads for the content and ensures the discussion stays on the topic and conforms to netiquette
Un-moderated
No administrator or moderator, which may allow discussion to degenerate
Text Messaging
Applied to messaging that takes place between two or more devices and sending messages to cell phone or pager
Email
The electronic exchange of messages and computer files between computers
Header
Consist of to, from, date, and subject
Addressee
Web address and sometimes the name of addressee (keyed in the to: section)
Author
Keyed in the FROM: section or entered automatically by service provider in the e-mail
Date
When the message is created
Subject
The topic of the message
Cc
Carbon copy or complimentary; notation for additional recipient names and web addresses
Bc
Blind copy; notation for recipients that are hidden from view
Body
Is the message of the e-mail
Signature
Is the name and contact information of the sender
Attachment
Are files that are sent along with the e-mail
Bullying
Harassing or bullying others on the internet; Spreading malicious info. about someone online
Virus
Software that attaches to programs installed on a computer or that are programmed to load when an email is opened
Spam
Unwanted emails from advertisers and users that contain malicious and explicit material or try to sell products or services
Spyware
Malicious software designed to take partial control of a computer's operation without the knowledge or consent of the user