SlideShare a Scribd company logo
1 of 3
Internet Terms

Use the internet to find definitions/explanations for each of the following terms.
You must be able to explain these terms in your own words.
1. Adware

         •   Any software package that has advertisements eg. Ask.com

2. ISP

         •   Internet Service Provider eg. Bell, Cogeco, Rogers

3. Cloud Storage

         •   Stores data in a virtual server that can be used from computer and/or mobile device
             eg. iCloud

4. Search Engine

         •   Used to search for information on the internet eg. Google, Yahoo

5. Cookie

         •   File that goes into computer and stores information. Websites can identify you the
             next time you log in eg. Hotmail, Facebook

6. Firewall

         •   System designed to prevent unauthorized access to and from a network.

7. Data-mining

         •   Software that drill through enormous amounts of data to create relationships.

8. Denial of Service Attack

         •   Used to stop internet site/service from working

9. Malware

         •   Software intended to damage a computer or network.
10. Net Neutrality

       •    All users have the right to receive information

11. P2P

       •    Peer to peer, networking software that lets people communicate

12. Pharming

       •    Hackers attempt to rewire one’s website server to another




13. Phishing

       •    Way of attempting to get someone’s personal information by disguising as a normal
            website.

14. Spam

15. Spyware

16. Trojan Horse

       •    Gives full control to an affected computer to another.

17. Virus

       •    Program that can harm your computer, and can spread to other computers.

18. Worm

19. Domain Name

       •    A series of letters or numbers separated by periods, used as an address for
            identifying the owner.

20. Meta Tag

21. Modem
22. Netiquette

More Related Content

What's hot

What's hot (20)

Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analytics
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Butti mohammad
Butti mohammadButti mohammad
Butti mohammad
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Hacking
HackingHacking
Hacking
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
internet security
internet securityinternet security
internet security
 
Definition
DefinitionDefinition
Definition
 

Viewers also liked (8)

ITEC 299 Level 3 Synthesis Presentation
ITEC 299 Level 3 Synthesis PresentationITEC 299 Level 3 Synthesis Presentation
ITEC 299 Level 3 Synthesis Presentation
 
162 georges rouault-peintre
162 georges rouault-peintre162 georges rouault-peintre
162 georges rouault-peintre
 
1aos
1aos1aos
1aos
 
F entrega diseño
F entrega diseñoF entrega diseño
F entrega diseño
 
Final Year Project Media Art 2010/2011
Final Year Project Media Art 2010/2011Final Year Project Media Art 2010/2011
Final Year Project Media Art 2010/2011
 
The architect s_scale_11
The architect s_scale_11The architect s_scale_11
The architect s_scale_11
 
DOm 2
DOm 2DOm 2
DOm 2
 
Opredelenie arifmeticheskogo kornya_p_oj_stepeni
Opredelenie arifmeticheskogo kornya_p_oj_stepeniOpredelenie arifmeticheskogo kornya_p_oj_stepeni
Opredelenie arifmeticheskogo kornya_p_oj_stepeni
 

Similar to Internet terms

Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
I P Abir
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 

Similar to Internet terms (20)

Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Hamza
HamzaHamza
Hamza
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptx
 
History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Fundamentals of internet
Fundamentals of internetFundamentals of internet
Fundamentals of internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Internet terms

  • 1. Internet Terms Use the internet to find definitions/explanations for each of the following terms. You must be able to explain these terms in your own words. 1. Adware • Any software package that has advertisements eg. Ask.com 2. ISP • Internet Service Provider eg. Bell, Cogeco, Rogers 3. Cloud Storage • Stores data in a virtual server that can be used from computer and/or mobile device eg. iCloud 4. Search Engine • Used to search for information on the internet eg. Google, Yahoo 5. Cookie • File that goes into computer and stores information. Websites can identify you the next time you log in eg. Hotmail, Facebook 6. Firewall • System designed to prevent unauthorized access to and from a network. 7. Data-mining • Software that drill through enormous amounts of data to create relationships. 8. Denial of Service Attack • Used to stop internet site/service from working 9. Malware • Software intended to damage a computer or network.
  • 2. 10. Net Neutrality • All users have the right to receive information 11. P2P • Peer to peer, networking software that lets people communicate 12. Pharming • Hackers attempt to rewire one’s website server to another 13. Phishing • Way of attempting to get someone’s personal information by disguising as a normal website. 14. Spam 15. Spyware 16. Trojan Horse • Gives full control to an affected computer to another. 17. Virus • Program that can harm your computer, and can spread to other computers. 18. Worm 19. Domain Name • A series of letters or numbers separated by periods, used as an address for identifying the owner. 20. Meta Tag 21. Modem