click below
click below
Normal Size Small Size show me how
V-CDC-NorthStar
NorthStar Digital Literacy Vocabulary
Term | Definition |
---|---|
Android | An operating system used on smartphones and tablets. Example: My new smartphone runs on the latest version of Android. |
Antivirus Application | Software that is used to detect and eliminate computer viruses. Example: Make sure to regularly update your antivirus application to protect your computer from malware. |
Asynchronous Communication | Communication that does not happen in real time. Example: Email is an example of asynchronous communication because messages can be sent and received at different times. |
Attribution | Giving credit to the author or owner for their work. Example: It's important to provide proper attribution when using someone else's ideas in your research paper. |
Bcc | A blind carbon copy (Bcc) is a method used in an email application to send a message while keeping the identity of the receiver private. Example: I sent the email to my team with my boss Bcc'd to keep him informed without cluttering everyone's inboxes. |
Blog | An online journal that is commonly used to write about one's experiences, opinions, or to give a review. Example: She started a fashion blog to share her style tips and outfit inspirations with her followers. |
Bookmark | A way of saving a web page address to reference or return to later. Example: I bookmarked the recipe page so I can easily find it again when I want to cook dinner. |
Browser | An application used to access websites on the internet. Example: I use Google Chrome as my primary web browser because it's fast and user-friendly. |
Browser History | A list of websites that have been visited on the internet; this includes any data associated with the website and how long the user was on the website. Example: I accidentally deleted my browser history and now I can't remember the website I visited. |
Cable Internet | Transmits data through a cable television network as a means to connect a computer to the internet. Example: We switched to cable internet because it provides faster and more reliable connection compared to DSL. |
Cc | A carbon copy (Cc) is a method used in an email application to send a copy of the email to someone. A Ccd recipient is not required to respond to the message. Example: I cc'd my colleague on the email so she would be aware of the upcoming meeting. |
Citation | A means of giving credit to a source when their information is used. Example: The student included proper citations for all the sources used in her research paper. |
Computer Ethics | A set of principles that help users determine what is right or wrong in regards to computers. Example: Following computer ethics guidelines helps ensure responsible and ethical use of technology. |
Computer Virus | A software program that is loaded onto a computer, and then duplicates itself, spreading and infecting programs and files on the computer. Example: My computer got infected with a virus after I accidentally clicked on a suspicious link. |
Creative Commons License | A free license used by creators to permit others to use their content, free of charge, as long as they follow the license rules. Example: The photographer released their images under a Creative Commons license, allowing others to use them. |
Cyberbullying | The deliberate use of harmful words or pictures to cause embarrassment, hopelessness, or to intimidate another person online repeatedly. Example: Cyberbullying can have serious consequences on a person's mental health and well-being. |
Desktop Interface | Icons and menus on the computer that allow the user to interact with the operating system. Example: The desktop interface of the operating system allows users to easily access their files and applications. |
DSL | A digital subscriber line (DSL) transmits data digitally over phone lines. Example: Although DSL is slower than cable internet, it's still a popular choice in rural areas where cable infrastructure is not available. |
A method of communication used to send electronic messages using the internet. Example: I'll send you an email with the details of the meeting agenda. | |
Ethernet Cable | The cable used to connect computers in a network. An Ethernet cable allows data to be transferred from one computer to another computer. Example: I connected my computer to the router using an Ethernet cable for a more stable internet connection. |
Font | A typeset that has a particular face and size. Example: I changed the font of my presentation to make it more visually appealing. |
Hardware | Physical components of a computer system such as a keyboard, mouse, or modem. Example: The IT department is responsible for maintaining all the hardware in the office, including computers and printers. |
HTML | Hypertext Markup Language (HTML) is used to mark a web pages structure using tags so that the web browser displays the content correctly. Example: Learning HTML is essential for anyone interested in building websites. |
Instant Messaging | A means of text transmission sent in real time over the internet. Example: We use Slack for instant messaging at work to communicate with team members in real-time. |
Internet | A network of computers that provides access to information on the web. Example: The internet has revolutionized the way we access information and communicate with others around the world. |
Intranet | A restricted private network used by organizations to communicate. Example: Employees can access company documents and resources through the company's intranet. |
Malware | A virus or Trojan horse designed to cause harm to a computer or device. Example: Make sure to run a malware scan on your computer regularly to protect against viruses and other malicious software. |
Modem | A device that translates analog carrier signals to encode and decode digital information. Example: The modem converts digital signals from the computer into analog signals for transmission over the phone line. |
Naming Convention | A chosen method for organizing and naming files and folders. Example: Our company has a strict naming convention for files to ensure consistency and organization. |
Navigation Tracking | A tool that provides directions using satellites. Example: The GPS system provides accurate navigation tracking to help drivers reach their destination. |
Network | Computers that are connected through cable or Wi-Fi to share resources. Example: Our office computers are connected to the same network, allowing us to share files and printers. |
Network Adapter | Hardware that is used to connect a computer to another computer or server over a local area network. Example: I installed a new network adapter in my computer to improve its Wi-Fi connectivity. |
Online Anonymity | The state of being anonymous online. Example: Some people use VPNs to maintain online anonymity and protect their privacy. |
Open Source | Software that can be modified and distributed to others. Example: WordPress is an example of open-source software that allows users to customize and modify their website's code. |
Operating System | Software that manages all of the installed applications and hardware on a computer or device. Example: Windows and macOS are examples of operating systems that manage computer hardware and software resources. |
Page Orientation | How a document is displayed on a screen or in printed form. Example: When printing the document, make sure to select the correct page orientation (portrait or landscape) to fit the content. |
Password | A secret set of characters that are used to access a computer system or service. Example: Don't forget to change your password regularly to keep your accounts secure. |
Personal Identifiable Information | Information that can be used to distinguish or track a person's identity. Example: Social security numbers and credit card numbers are examples of personal identifiable information that should be protected. |
Phishing | A malicious attack that uses email, text messaging, and websites to gather sensitive information about people. Example: Be cautious of emails asking for personal information, as they may be phishing attempts. |
Plagiarism | Using another person's work as your own. Example: Copying and pasting text from a website without proper citation is considered plagiarism. |
Private Browsing | A way to access websites on the internet without being tracked. Example: I use private browsing mode when searching for sensitive information to prevent it from being tracked. |
Proprietary | Software that the owner maintains exclusive control over how it is modified and distributed. Example: Microsoft Office is proprietary software owned by Microsoft Corporation. |
Public Domain | Content that is not owned by any individual or company and that is free to use. Example: Shakespeare's works are in the public domain, so anyone can freely use and distribute them. |
RAM | Random-access memory (RAM) uses volatile memory to store information as long as the computer has a power source. Example: Adding more RAM to your computer can improve its performance when running multiple programs simultaneously. |
Repetitive Stress Injuries | Repetitive motions that cause damage to muscles, nerves, and tendons in the body. Example: Typing on the keyboard for long hours can lead to repetitive stress injuries such as carpal tunnel syndrome. |
Reply | An email response method used to send a response to the original sender. Example: I'll reply to your email as soon as I finish reading it. |
Reply All | An email response method used to send a response to everyone included in the original message. Example: Be careful not to accidentally click Reply All when responding to an email sent to a large group. |
ROM | Read-only memory (ROM) is volatile memory that stores information even without power. Example: The BIOS is stored in ROM and is used to boot up the computer when it is powered on. |
Router | A device used to transmit data packets from one computer network to another. Example:I reset the router to fix the internet connection issues. |
Search Engine | Software used to search a database using keywords or phrases entered by the user. Example: Google is the most popular search engine used to find information on the internet. |
Search Operators | Commands and special characters used to refine search engine results. Example: Using quotation marks around a phrase in the search bar narrows down the results, a common search operator. |
Session | The time a user spends on a website. The time (session) is used to measure that website's traffic. Example: My browsing session timed out after being inactive for too long. |
Spyware | A malicious software program that spies on the user and shares the information with a third party. Example: Installing an antivirus program can help protect your computer from spyware. |
Start Button | A button on a Windows operating system desktop that allows users to access computer programs, files, and settings. Example: Click on the Start button to access the programs and settings on your computer. |
Synchronous Communication | Communication that happens in real time. Example: Video conferencing allows for synchronous communication between team members located in different parts of the world. |
Term | Definition, describe a thing or to express a concept, Example: The term algorithm refers to a set of rules or instructions for solving a problem. |
Toolbar | An element on a computer's desktop where buttons, icons, menus, and other elements are placed. Example: I customized my browser's toolbar to include shortcuts to my favorite websites. |
Trojan Horse | A malicious program that is disguised as something else. Trojan horses may be used to steal or destroy data, crash systems, or replicate to other systems. Example: The email attachment turned out to be a Trojan horse disguised as a harmless document. |
USB | A universal serial bus (USB) is used to connect devices like printers, keyboards, external storage, and digital cameras to computers. Example: I transferred the files from my computer to the USB drive for easy portability. |
Video Conference | A means of communication using video and audio to speak in real time with others over the internet. Example: We had a video conference with the overseas team to discuss the project status. |
Virtual Assistant | An application that completes tasks based on the voice commands it is given by a user. Example: I use a virtual assistant app on my phone to set reminders and schedule appointments. |
VPN | Virtual private network (VPN) is a computer network that can help create a secure connection to the internet. Example: I use a VPN when connecting to public Wi-Fi networks to encrypt my internet traffic and protect my privacy. |
Wi-Fi | A wireless connection to the internet. Example: I connected my phone to the Wi-Fi network to save on data usage. |