Glossary


Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  6  7  8  9  10  ...  20  (Next)
  ALL

C

Caps Lock

The middle key on the left of a computer keyboard. When it is selected, the computer types letters in upper case.


catfish

A slang term for someone who deceives a person with a false identity online, often to seduce them.


catfishing

Describes the activity of a catfish.


Chrome

A type ofweb browser run by Google, indicated by a red, yellow, green and blue circle.


CIA triad

CIA is an acronym for ‘confidentiality, integrity, availability’. A cyber security model that is used to guide organisations in keeping data secure.


closed captions

A text version of the spoken words of television, video, computer presentation or movie content. Closed captioning was developed to aid hearing-impaired people.


Cloud

An internet-based storage facility on an external server. It allows people and organisations to save and share photos, documents and files.


cloud backup

Enables computer users to back up data on their hard drive to a remote cloud-based server. When cloud backup is selected, it will automatically save files for you.


cloud platform

The software infrastructure for a cloud computing system. It has applications for the user to create and manage their own accounts.


computer case

The outer shell of the computer that houses the computer components.


computer hardware

What you can physically touch. For example, your laptop.


computer software

Digitally installed programs that tell the computer what to do. For example, your search engine.


computer virus

A malicious software program loaded on to a user’s computer without the user’s knowledge. It is designed to damage your computer by corrupting files and destroying data.


consumer rights

A consumer’s legal rights when engaging in trade, including digital transactions.


Cortana

Cortana is Microsoft’s virtual assistant. It uses the Bing search engine to perform tasks such as setting reminders and answering questions.



cursor

A movable indicator on a computer screen. It is usually a vertical straight line that flashes.


cyber

The digital culture of computers, information technology and virtual reality that is the computer-generated simulation of a three-dimensional image or environment.


cyber attack


cyber crime

A criminal activity using computers and the internet. This includes downloading illegal music files, hacking bank accounts and stealing money or data, and creating and distributing computer viruses. Cyber crime is also known as a cyber attack.


cyber security

The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attack.



Page:  1  2  3  4  5  6  7  8  9  10  ...  20  (Next)
  ALL