Access: A privilege to use computer information in some manner. For example, a user might be granted read access to a file, meaning that the user can read the file but cannot modify or delete it. Most operating systems have several different types of access privileges that can be granted or denied to specific users or groups of users.
Acquisition: An asset or object bought or obtained, typically of one company acquiring another.
Affiliate: A type of inter-company relationship in which one of the companies owns less than a majority of the other company’s stock, or a type of inter-company relationship in which at least two different companies are subsidiaries of a larger company.
Application: An application is a program or group of programs designed for end users. Application software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems, compilers, and utilities for managing computer resources.
Authentication: A security measure designed to protect a communications system against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator.
Bandwidth: The amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
Blog: A Web site that contains an online personal journal with reflections, comments, and often hyperlinks provided by the writer.
Bookmark: An address for a website stored on a computer so that the user can easily return to the site.
Cache: A fast storage buffer in the central processing unit of a computer. Also called cache memory.
Cloud Computing: A model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. This type of system allows employees to work remotely.
Code: A system of symbols and rules used to represent instructions to a computer; a computer program.
Community Guidelines: A set of rules and guidelines set by Internet and mobile providers on their services in order to help users enjoy their services without harming others.
Contact: The entity responsible for providing and maintaining the connection of a network which allows other users to interact with one another.
Cookies: A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.
Crawler: A Web crawler is a computer program that browses the World Wide Web in a methodical, automated manner or in an orderly fashion.
Cyber-Bullying: The electronic posting of mean-spirited messages about a person often done anonymously.
Digitize: To transcribe (data) into a digital form so that it can be directly processed by a computer
Domain: A group of networked computers that share a common communications address.
Download: To copy data from one computer to another or to a disk.
Drag-And-Drop: In computer graphical user interfaces, drag and drop is a pointing device gesture in which the user selects a virtual object by “grabbing” it and dragging it to a different location or onto another virtual object. In general, it can be used to invoke many kinds of actions, or create various types of associations between two abstract objects.
Ecosystem: A digital ecosystem is a distributed adaptive open socio-technical system with properties of self-organization, scalability and sustainability inspired from natural ecosystems. As an emerging field of study, “digital ecosystems” is informed by knowledge of natural ecosystems and is still being defined.
Embed: To make images, sound, or computer software a part of other software.
Encode: To convert (a message) from plain text into code.
Encryption: Encryption is a process which is applied to text messages or other important data, and alters it to make it humanly unreadable except by someone who knows how to decrypt it. The complexity of the algorithms used means that a strongly encrypted message might require thousands of years of processing by very fast computers to break the encryption.
Firewall: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especiallyintranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Gadget: A gadget is a small tool such as a machine that has a particular function, but is often thought of as a novelty.
Gateway: Software or hardware that enables communication between computer networks that use different communications protocols. Also called router.
Hits: A hit is a request for a file made by a user-agent. User-agents include web browsers and search engine indexing programs, or spiders. Each time a web page is viewed a user-agent requests the individual files that make up the page from the computer where the website is stored (web server). A record of the hits received is automatically created and saved as part of monitoring the web server performance. This record is called a web server log.
IP Address: IP address is short for Internet Protocol (IP) address.
An IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination.
Keyword: A word that acts as the key to a cipher or code.
Link: a link is a reference to another document. Such links are sometimes called hot links because they take you to other document when you click on them.
Malware: Software that is intended to damage or disable computers and computer systems.
Notification: A signaling technique used by data transmission systems in order to indicate the status of anything from changes to updates.
Online: Controlled by or connected to another computer or to a network.
Open Source: Open source refers to a program in which the source code is available to the general public for use and/or modification from its original design free of charge, i.e., open. Open source code is typically created as a collaborative effort in which programmers improve upon the code and share the changes within the community. Open source sprouted in the technological community as a response to proprietary software owned by corporations.
Phishing: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
Platform: A computing platform includes a hardware architecture and a software framework (including application frameworks), where the combination allows software, particularly application software, to run.
Plug-In: A hardware or software module that adds a specific feature or service to a larger system. The idea is that the new component simply plugs in to the existing system.
Post: A message published in an online forum or newsgroup.
Profile: (Profiles) are the information that you provide about yourself when signing up for a social networking site. As well as a picture and basic information, this may include your personal and business interests, a “blurb” about yourself, and tags to help people search for like-minded people.
Rate/Rating: A classification or ranking of someone or something based on a comparative assessment of their quality, standard, or performance.
Server: A computer or computer program that manages access to a centralized resource or service in a network.
Snippet: Snippet is a programming term for a small region of re-usable source code, machine code or text.
Spam: Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email.
Spyware: Software that self-installs on a computer, enabling information to be gathered covertly about a person’s Internet use, passwords, etc
Tag/ Tagging: Commonly used in blogs, site authors attach keyword descriptions (called tags) to identify images or text within their site as a categories or topic. Web pages and blogs with identical tags can then be linked together allowing users to search for similar or related content.
Theme: A template designed specifically for use to enhance the visual appearance and usability of a blog. Many blogging software providers offer a selection of themes for bloggers to choose from for their blogs. Alternatively, predesigned blog themes can be found through a variety of websites, and many web designers create custom themes for blogs.
Trends: A general direction in which something is developing or changing
Update: A manipulation involving adding, modifying, or deleting data to bring a file or database up to-date.
Upgrade: Raise (something) to a higher standard, in particular improve (equipment or machinery or even software) by adding or replacing components.
Upload: To transmit data from a computer to a bulletin board service, mainframe, or network. For example, if you use a personal computer to log on to a network and you want to send files across the network, you must upload the files from your PC to the network.
URL: Uniform (or universal) resource locator, the address of a World Wide Web page.
Webmaster: A person who designs and develops Web sites