Page 135 - digitalliteracy
P. 135

Summary & Resources



                       Key Terms

                       browser cookie  A computer file containing   firewall  A network security software
                       a small piece of data that is stored in a web   system that monitors incoming and outgo-
                       browser while (and sometimes after) a user   ing information and protects the computer
                       is browsing the website. It records informa-  network from harmful information from
                       tion about the user and the user’s activity on   other computers or other networks such as
                       the site. Also known as a tracking cookie.   the Internet.


                       computer virus  A software program that,     host  See domain name.
                       when installed on a computer, creates copies
                       of itself and often modifies other computer   IP address  Internet protocol address; a
                       programs or files or performs harmful activi-  series of numbers assigned to every digital
                       ties such as destroying data or damaging     device when it is manufactured and to every
                       computer hardware. When such a program       site on the World Wide Web. These numbers
                       is installed, it is said to “infect” the computer.  are recorded on the device and on the site
                                                                    when the two are connected. Thus, every
                       computer worm  A type of malware that        website has a record of the devices that have
                       scans your computer for holes or openings    visited, and every device has a record of
                       in your security system. The worm enters     every website it has visited.
                       through one of these holes and, on a com-
                       puter network, can copy itself from machine   malware   Harmful software programs that
                       to machine.                                  are intended to interfere with other com-
                                                                    puter systems and disrupt their operations,
                       cookie profiling  The use of browser cook-   gather sensitive information, or cause other
                       ies to track personal information about a    types of damage to the system. Also known
                       user who visits a website and to create a    as spyware.
                       record of that user’s activity online; this
                       record is commonly used by marketers, so     pop-up ads  A form of online advertising
                       they can market products and services to the  on the World Wide Web designed to attract
                       user more effectively the next time he or she   readers by displaying specific ads to them
                       visits the website.                          when they browse pages on the web.


                       data aggregator  An individual or company    pornography  Printed or visual mate-
                       that makes money by collecting and compil-   rial that contains explicit descriptions or
                       ing data and information about people from   displays of sexual organs or activity that is
                       the web and selling it to others.            intended to create sexual excitement.


                       digital footprint  The electronic trail of   scam  A dishonest plan, especially one to get
                       digital data about you and your computer     money from other people by misleading or
                       that you leave on the web as you browse      tricking them.
                       from one website to another.
                                                                    spam  E-mails that are sent, usually to large
                       domain name  A name assigned to a web-       numbers of people on the Internet, that are
                       site and linked to the website’s IP address   not requested and often not wanted.
                       that has two parts: a web page name and a
                       web extension. Also known as host.           spyware  See malware.








                                                                 119
                        © 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.



       sol82612_06_m06_097-120.indd   119                                                                            6/29/16   5:14 PM
   130   131   132   133   134   135   136   137   138   139   140