Commonly Used Terms
This term is derived
from Web log
and is an increasingly popular type of Web site. Most take
the form of journal entries and allow readers to post
This browser feature
stores a Web address in memory and allows the user to link quickly to the site.
These Web sites or
online services facilitate electronic discussions by quickly posting the comments and
responses of multiple users.
Web sites allow children to get around some
filtering software and access sites
that have been blocked.
refers to any online threats by one student toward another, typically through e-mails or on
Web sites (e.g., blogs,
cybercrime: This refers to any
Internet-related illegal activity.
(sometimes cyber security):
This refers to any
technique, software, etc., used to protect computers
and prevent online crime.
This refers to a
number of methods individuals use to track, lure, or harass another person online.
maintain a record of all Web site visits and e-mail messages, leaving a trail of the user's
activity in cyberspace. These data can still exist even after the browser
has been cleared and e-mail
messages have been deleted.
This is the name for
(see above) used by Microsoft’s
Internet Explorer browser.
This software enables
multiple users to access the same computer file simultaneously. File sharing sometimes
is used illegally to download music or software.
This refers to
different types of software that screen and block online content.
This term describes Internet games,
which can be played either individually or by multiple online
users at the same time.
These Internet users
intentionally cause problems for other
This refers to the
techniques sexual predators use to get to know their victims in preparation for sexual abuse.
This is a tracking feature
of Internet browsers that shows all the recent Web sites visited.
In this crime,
someone obtains the vital information (e.g., credit
card, Social Security, bank account numbers)
of another person, usually to steal money. Email scams,
are among the most typical methods
for stealing someone’s identity.
the acronym IM,
this is a variation of
users to communicate through text messages.
This refers to any
computer code that is intentionally introduced into a system to damage or destroy files or
disrupt the operation of a computer.
This refers generally to
the technique of tracking where people have been on the Internet by looking at the
of the browser. It also refers to
software used for the same purpose.
P2P (see peer-to-peer computing)
peer-to-peer (P2P) computing:
is a popular way for Internet users to share one another’s computer files—usually music,
game, or software files.
This scam involves sending
a fraudulent e-mail soliciting credit card, Social Security, or other personal information
from an unsuspecting user.
broadly to online communities where people share information about themselves, music
files, photos, etc. There are many social networking Web sites (e.g., MySpace, Facebook, or Friendster).
This refers to any unsolicited
e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet
Service Providers, e-mail software, and other software can help block some, but not
This refers to a wide-variety
of software installed on people’s computers without their
knowledge. The programs typically will track computer
use and create numerous pop-up ads. In some instances,
the spyware can damage the computer and facilitate
These are software programs
that typically arrive through e-mail attachments and multiply on the hard drive, quickly
exhausting the computer’s memory. A
is a variation that
allows unauthorized users access to the computer, from
which they can send infected e-mails or
wireless computers: Many networks
now allow computers access to the Internet without being connected with wires.
These networks are becoming increasingly more popular and powerful, allowing people to
access the Internet using cell phones and other devices.