Following are technology terms as defined by the Virginia Department of Education on its Internet Safety Web Page. Parents, faculty, and staff can use this glossary to better understand how to communicate effectively with today’s youth regarding Internet safety.
blog/blogging: This term is derived from web log and is an increasingly popular type of Web site. Most take the form of journal entries and allow readers to post comments.
bookmark(s): This browser feature stores a web address in memory and allows the user to link quickly to the site.
chat rooms: These web sites or online services facilitate electronic discussions by quickly posting the comments and responses of multiple users.
circumventor sites: These parallel web sites allow children to get around some filtering software and access sites that have been blocked.
cyberbullies/cyberbullying: This refers to any threats by one student toward another, typically through e-mails or on web sites (e.g., blogs, social networking sites).
cybercrime: This refers to any Internet-related illegal activity.
cybersecurity: This refers to any technique, software, etc., used to protect computers and prevent online crime.
cyberstalking: This refers to a number of methods individuals use to track, lure, or harass another person online.
favorite(s): A type of bookmark (see above) used by Microsoft’s Internet Explorer browser.
file sharing: This software enables multiple users to access the same computer file simultaneously. File sharing sometimes is used illegally to download music or software.
filter/filtering: This refers to different types of software that screen and block online content.
footprints: This refers to the digital trail or traces a user leaves online. This is information transmitted online, such as forum registration, e-mails and attachments, uploading videos or digital images and any other form of transmission of information — all of which leaves traces of personal information about yourself available to others online.
forum: This refers to an online discussion group. Online services provide a variety of forums in which participants with common interests can exchange open messages. Forums are sometimes called newsgroups.
gaming: This term describes Internet games, which can be played either individually or by multiple online users at the same time.
griefers: These Internet users intentionally cause problems for other gamers.
history: This is a tracking feature of Internet browsers that shows all the recent web sites visited.
identity theft: In this crime, someone obtains the vital information (e.g., credit card, Social Security, bank account numbers) of another person, usually to steal money. E-mail scams, spy ware, and viruses are among the most typical methods for stealing someone’s identity.
instant message/messaging: Known by the acronym IM, this is a variation of chat rooms that allows users to communicate through text messages.
Internet Service Provider (ISP): This is a company that provides Internet services, including personal and business access to the Internet for a monthly fee
ISP: see Internet Service Provider
monitoring: This refers generally to the technique of tracking where people have been on the Internet by looking at the history of the browser. It also refers to software used for the same purpose.
P2P: (see peer-to-peer computing)
peer-to-peer (P2P) computing: This is a popular way for Internet users to share one another’s computer files—usually music, game, or software files.
phishing: This scam involves sending a fraudulent e-mail soliciting credit card, Social Security, or other personal information from an unsuspecting user.
social networking: This refers broadly to online communities where people share information about themselves, music files, photos, etc. The most popular is Facebook.
spam: This refers to any unsolicited e-mail, or junk mail. Most spam is either a money scam or of a sexual nature. Internet service providers, e-mail software, and other software can help block some, but not all, spam.
spyware: This refers to a wide-variety of software that is installed on people’s computers without their knowledge. The programs typically will track computer use and create numerous pop-up ads. In some instances, the spyware can damage the computer and facilitate identity theft.
viruses: These are software programs that typically arrive through e-mail attachments and multiply on the hard drive, quickly exhausting the computer’s memory. A trojan is a variation that allows unauthorized users access to the computer, from which they can send infected e-mails or spam.
wireless computers: Many networks now allow computers access to the Internet without being connected by wires. These networks are becoming increasingly more popular and powerful, allowing people to access the Internet using cell phones and other devices.