Page 135 - digitalliteracy
P. 135
Summary & Resources
Key Terms
browser cookie A computer file containing firewall A network security software
a small piece of data that is stored in a web system that monitors incoming and outgo-
browser while (and sometimes after) a user ing information and protects the computer
is browsing the website. It records informa- network from harmful information from
tion about the user and the user’s activity on other computers or other networks such as
the site. Also known as a tracking cookie. the Internet.
computer virus A software program that, host See domain name.
when installed on a computer, creates copies
of itself and often modifies other computer IP address Internet protocol address; a
programs or files or performs harmful activi- series of numbers assigned to every digital
ties such as destroying data or damaging device when it is manufactured and to every
computer hardware. When such a program site on the World Wide Web. These numbers
is installed, it is said to “infect” the computer. are recorded on the device and on the site
when the two are connected. Thus, every
computer worm A type of malware that website has a record of the devices that have
scans your computer for holes or openings visited, and every device has a record of
in your security system. The worm enters every website it has visited.
through one of these holes and, on a com-
puter network, can copy itself from machine malware Harmful software programs that
to machine. are intended to interfere with other com-
puter systems and disrupt their operations,
cookie profiling The use of browser cook- gather sensitive information, or cause other
ies to track personal information about a types of damage to the system. Also known
user who visits a website and to create a as spyware.
record of that user’s activity online; this
record is commonly used by marketers, so pop-up ads A form of online advertising
they can market products and services to the on the World Wide Web designed to attract
user more effectively the next time he or she readers by displaying specific ads to them
visits the website. when they browse pages on the web.
data aggregator An individual or company pornography Printed or visual mate-
that makes money by collecting and compil- rial that contains explicit descriptions or
ing data and information about people from displays of sexual organs or activity that is
the web and selling it to others. intended to create sexual excitement.
digital footprint The electronic trail of scam A dishonest plan, especially one to get
digital data about you and your computer money from other people by misleading or
that you leave on the web as you browse tricking them.
from one website to another.
spam E-mails that are sent, usually to large
domain name A name assigned to a web- numbers of people on the Internet, that are
site and linked to the website’s IP address not requested and often not wanted.
that has two parts: a web page name and a
web extension. Also known as host. spyware See malware.
119
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
sol82612_06_m06_097-120.indd 119 6/29/16 5:14 PM

