8 - Glossary
Term/Word
Definition
Ad blocker
Android
Apps
Programmes installed on your mobile device, tablet
Bluetooth
A kind of wireless technology that enables short-range communication between devices like mobile phones or tablets. It only operates when devices have their bluetooth capability turned on.
Bug
A fault or failure in a software program
Cookies
Encryption
The process of encoding information or messages in such a way that only authorized parties can read it.
Firewall
Geotagging
The process of adding geographical information to various media for example photos
GPS
The Global Positioning System (GPS) identifies your location using a system of satellites.
Hack
To get unauthorised access to data in a system or computer
Incognito mode
Incognito mode on the web prevents Google Chrome from saving a record of what you visit and download.
iOS
Operating system for apple mobile devices
IP (Internet Protocol) Address
A unique set of four numbers separated by a full stops which is used to identify your computer or device when it connects to the internet
Facebook Timeline
The area of facebook where a user’s photos, updates and events are shared.
Open Source
Software for which the original design and code is made freely available to the public so it can be redistributed and modified.
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
Plug-in
An application that can be installed and used as part of your normal web-browser to add new features such as virus scanners.
Spyware & Malware
Malware is a kind of software designed to damage a computer system without the owner’s knowledge or consent. The most common way a person will install Malware on a computer system is through the internet, including e-mail. Spyware is a form of malware that is installed on computers to collect information about users without their knowledge. Spyware programs can monitor and collect personal information and change user settings stored on the compromised computer.
Rooting (or jailbreaking)
Spokeo
A website that combines data from various social networks.
SIM
A smart card inside a mobile phone that stores the identification number unique to the owner and personal data (i.e. contact data). Removal of the SIM card will stop the phone from working.
Two-factor Authentication
Technology that provides identification of users by means of the combination of two different components. For example when withdrawing money from a cash machine users are required to provide the combination of a bank card and a personal identification number (PIN).
Trackers
The analysis of a visitor’s behaviour on a website that results in the visitor being presented with content tailored to their interests based on what websites they visit and what they look at.
VoIP
Voice over IP (VoIP) is a form of technology that allows voice and video communications over the internet. The most well-known example is Skype.
Web Cache
Temporary storage of web documents
HOW TO VIDEOS
Shopping & Banking
VPN
Social Networking
General
Last updated