Glossary


Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  (Next)
  ALL

A

Access token

An access token is an object encapsulating the security identity of a process or thread. A token is used to make security decisions and to store tamper-proof information about some system entity. While a token is generally used to represent only security information, it is capable of holding additional free-form data that can be attached while the token is being created.


C

Copyright

the exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material.


Critical thinking

is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from, or generated by, observation, experience, reflection, reasoning, or communication, as a guide to belief and action


D

Dropbox

Dropbox is a cloud storage service that lets you save files online and sync them to your devices. You can use Dropbox links to share files and folders with other people without sending large attachments. Dropbox offers a free plan that includes 2 GB of storage.


E

eBook

an electronic version of a printed book that can be read on a computer or a specifically designed handheld device.


F

Fraud

Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them.


G

Google Chrome

Google Chrome is a cross-platform web browser developed by Google.


Google Drive

Google Drive is a file storage and synchronization service developed by Google. It allows users to store files on their servers, synchronize files across devices, and share files.



I

Infographics

a visual representation of information or data, e.g. as a chart or diagram


Internet Explorer

 Internet Explorer is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.


K

Keywords

In terms of search engines, a keyword is any search term entered on Google (or another search engine) that has a results page where websites are listed.


M

M4a

A file format generally used with music files that are higher in quality for about the same file size. M4a files are the most common file extension for audio imported off CDs using iTunes. This audio container was first used by Apple to differentiate MPEG-4 audio files from the popular MP4 video file container.


Mozilla Firefox

Mozilla Firefox is a free open-source browser


Mp3 (file)

An MP3 file is an audio file that uses a compression algorithm to reduce the overall file size


O

Online article

online articles are articles in scholarly journals or magazines that can be accessed via electronic transmission


S

Safari

Safari is a graphical web browser developed by Apple, it is found on iPhones, iPad, and Macs.


Screencast

A screencast is a digital video recording of your computer screen and usually includes audio narration. Screencasts are just one of many different types of instructional videos.


Social Media

websites and applications that enable users to create and share content or to participate in social networking. Examples are Facebook, Instagram, Youtube, etc.


Spam

Spam is defined as irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware.


T

Third- party app

An application that is provided by a vendor other than the manufacturer of the device. For example, the iPhone comes with its own camera app, but there have been camera apps from third parties that offered advanced features such as a self timer and simple editing. Until Apple incorporates the same enhancements in its own products, third-party apps offer advantages to the user.


Transparency

a situation in which business and financial activities are done in an open way without secrets so that people can trust that they are fair and honest


V

Virus

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Even less harmful computer viruses can significantly disrupt your system's performance, destroy computer memory and cause frequent computer crashes.


W

WeTransfer

WeTransfer is a simple way of file sharing. It works as if your e-mail account can support those large file sizes — you type in your email address and the recipient's email address, add a message, attach the file, and send. The recipient gets an e-mail with a link to download the file.



Page:  1  2  3  (Next)
  ALL