Page 231 - digitalliteracy
P. 231

Glossary




                   under Section 7801 of the Internal Revenue   metadata Big-picture data that is compiled
                   Code. The secretary has full authority to   from many smaller data points; often used
                   administer and enforce the internal revenue   by corporations and intelligence groups to
                   laws and has the power to create an agency   create user or target profiles.
                   to enforce these laws. The IRS was created
                   based on this legislative grant.            mobile computing device A small, porta-
                                                               ble computer such as a smartphone, laptop,
                   Internet A massive global computer net-     or tablet.
                   work of other computers and other, smaller
                   networks.                                   modem In a home or office network, the
                                                               device that connects with the Internet
                   intranets Internal networks that busi-      through a telephone landline.
                   nesses and organizations use to share
                   files and information among stakeholders,   multimedia Text, graphics, and sound.
                   develop collaborative projects, and share
                   computer applications.                      netbooks Sometimes referred to as mini
                                                               laptops or subnotebooks because they have
                   IP address Internet protocol address; a     less computing power, these small, light-
                   series of numbers assigned to every digital   weight computing devices are designed
                   device when it is manufactured and to every   primarily for consuming content. Google’s
                   site on the World Wide Web. These numbers   Chromebook is a type of netbook.
                   are recorded on the device and on the site
                   when the two are connected. Thus, every     networking The process of meeting and
                   website has a record of the devices that have   talking with people to exchange informa-
                   visited, and every device has a record of   tion, contacts, and experiences for common
                   every website it has visited.               professional or social purposes.

                   job fair  See career fair.                  Old-Age, Survivors, and Disability Insur-
                                                               ance The part of the Social Security Act of
                   laptop Also referred to as a notebook,      1935 that established a system of retirement
                   a portable computer that has the same       benefits for workers.
                   components and capabilities as a desktop
                   computer.                                   online etiquette Polite and professional
                                                               behavior that is appropriate when you use
                   literacy The ability to read and write.     digital resources.

                   loan principal The amount of money you      open-source software Software that can
                   borrowed or the amount you still owe on     be used, modified, and distributed by any-
                   your loan.                                  one. Google Drive applications are an exam-
                                                               ple of open-source software.
                   loan term The length or duration of your
                   loan.                                       paraphrase The act of writing someone
                                                               else’s ideas in one’s own words.
                   malware  Harmful software programs that
                   are intended to interfere with other com-   phishing An attempt to obtain sensitive
                   puter systems and disrupt their operations,   information from another computer user,
                   gather sensitive information, or cause other   often for malicious or fraudulent purposes
                   types of damage to the system. Also known   such as identity theft, by masquerading as a
                   as spyware.                                 trustworthy source.




                                                             215
   226   227   228   229   230   231   232   233   234   235   236