Page 233 - digitalliteracy
P. 233

Glossary




                   social networking A method of building      reading devices; others perform additional
                   networks or social relationships among      tasks, and some of the latest tablets allow
                   people who share common interests, back-    you to access the Internet and perform
                   grounds, or activities.                     some of the functions of a desktop or laptop
                                                               computer.
                   soft credit inquiries The perusal of a credit
                   report by an insurance company, future      tracking cookie See browser cookie.
                   employer, or credit card company that looks
                   through credit bureau reports to determine   traditional IRA A retirement account an
                   whether to extend a preapproved offer for   investor can use if he or she meets certain
                   credit to an individual in the future. These   specifications; individuals can deduct from
                   inquiries do not work against the consum-   their taxable income the amount (up to a
                   ers’ credit score and are unseen by hard    limit) contributed to a traditional IRA.
                   credit inquirers.
                                                               transferable skills Abilities that have been
                   soft skills Traits and behaviors based on   developed in one workplace or situation
                   personal strengths and unique personality   that can be useful in another workplace or
                   characteristics. Examples include athletic   situation.
                   ability or people skills.
                                                               Trojan horse A type of malware that
                   software The systems and programs that      disguises itself as one type of program but
                   run on your computer hardware.              is actually a different type of program. The
                                                               Trojan horse is usually spread when a com-
                   spam E-mails that are sent, usually to large   puter user opens an e-mail attachment or
                   numbers of people on the Internet, that are   downloads a file that contains the malware.
                   not requested and often not wanted.
                                                               tweetups Similar to flash mobs, gatherings
                   spreadsheet software Software that          of people organized through social media or,
                   includes graphing functions, so you can     in this case, Twitter.
                   show numbers in a bar, line, or pie chart.
                   Spreadsheets can also be used to balance    uniform resource locator (URL) See web
                   your personal checkbook and create and      address.
                   monitor a family budget.
                                                               USB Internet stick A small device that
                   spyware See malware.                        acts like a modem, plugs into your laptop
                                                               computer through a USB port, and gives you
                   sync The ability to synchronize all elec-   wireless Internet service. These services use
                   tronic devices, so that when the user makes   mobile broadband telephone services from
                   changes to any of these devices, the changes   cellular service providers.
                   are made everywhere.
                                                               VantageScore 3.0 A mathematical formula
                   tablet computer A thin, flat slate that     that the three major credit bureaus devel-
                   is small, lightweight, and portable. Users   oped to generate your credit score based
                   operate the tablet by touching the screen in   on payment history, age and type of credit,
                   various ways to perform different functions,   percentage of credit line used, total balance
                   although some tablets have a small keyboard  or debt, recent credit behavior, inquiries,
                   attached. Some tablets are simply electronic   and available credit.







                                                             217
   228   229   230   231   232   233   234   235   236   237   238