Glossary
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
C |
---|
Caps LockThe middle key on the left of a computer keyboard. When it is selected, the computer types letters in upper case. | |
catfishA slang term for someone who deceives a person with a false identity online, often to seduce them. | |
catfishingDescribes the activity of a catfish. | |
ChromeA type ofweb browser run by Google, indicated by a red, yellow, green and blue circle. | |
CIA triadCIA is an acronym for ‘confidentiality, integrity, availability’. A cyber security model that is used to guide organisations in keeping data secure. | |
closed captionsA text version of the spoken words of television, video, computer presentation or movie content. Closed captioning was developed to aid hearing-impaired people. | |
CloudAn internet-based storage facility on an external server. It allows people and organisations to save and share photos, documents and files. | |
cloud backupEnables computer users to back up data on their hard drive to a remote cloud-based server. When cloud backup is selected, it will automatically save files for you. | |
cloud platformThe software infrastructure for a cloud computing system. It has applications for the user to create and manage their own accounts. | |
computer caseThe outer shell of the computer that houses the computer components. | |
computer hardwareWhat you can physically touch. For example, your laptop. | |
computer softwareDigitally installed programs that tell the computer what to do. For example, your search engine. | |
computer virusA malicious software program loaded on to a user’s computer without the user’s knowledge. It is designed to damage your computer by corrupting files and destroying data. | |
consumer rightsA consumer’s legal rights when engaging in trade, including digital transactions. | |
CortanaCortana is Microsoft’s virtual assistant. It uses the Bing search engine to perform tasks such as setting reminders and answering questions. | |
cursorA movable indicator on a computer screen. It is usually a vertical straight line that flashes. | |
cyberThe digital culture of computers, information technology and virtual reality that is the computer-generated simulation of a three-dimensional image or environment. | |
cyber attack(See cyber crime) | |
cyber crimeA criminal activity using computers and the internet. This includes downloading illegal music files, hacking bank accounts and stealing money or data, and creating and distributing computer viruses. Cyber crime is also known as a cyber attack. | |
cyber securityThe application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attack. | |
For further information, take a look at our frequently asked questions which may give you the support you need.
If you have any concerns about anything on this site please get in contact with us here.