Professional Documents
Culture Documents
EMPWERMENT TECHNOLOGY
PROACTIVELY INTERACTS WITH THE USERS AND PROCESSES THEIR BUSINESS TASKS
TO ACCOMPLISH THEIR BUSINESS GOALS.
INTERNET SECURITY:A VERY BROAD ISSUE COVERING SECURITY IN RELATION TO TRANSACTIONS MADE
OVER THE INTERNET.
MOBILE LEARNING: LEARNING BY MEANS OF A HAND- HELD DEVICE, SUCH AS MOBILE PHONES OR A
TABLET.
VIRTUAL CLASSROOM: MAY ALSO BE REFERRED TO AS DIGITAL CLASSROOM WHERE LEARNING TAKES PLACE
OVER THE INTERNET AND NOT IN A PHYSICAL CLASSROOM.
FORUM:A PLACE ON THE INTERNET WHERE USERS WITH COMMON INTERESTS INTERACT WITH EACH OTHER
TO FIND INFORMATION AND DISCUSS TOPICS.
KEYWORD: A WORD OR GROUP OF WORDS THAT A PERSON MAY USE TO SEARCH FOR IN A SEARCH ENGINE.
SEARCH ENGINES: ARE SOFTWARE SYSTEMS THAT PEOPLE TO SEARCH FOR THINGS ON THE INTERNET.
WEBINAR: REFERS TO A “ WEB SEMINAR” A WEBINAR IS A SEMINAR CONDUCTED OVER THE INTERNET
MAKING IT POSSIBLE TO “ VIRTUALLY ATTEND “ THROUGH AN INTERNE CONNECTION.
WEBPAGE: THE WEBPAGE IS THE PAGE SEEN BY THE USER WHEN BROWSING THE INTERNET.
UNIFORM RESOURCE LOCATORS (URL): THESE ARE THE SPECIFIC ADDRESSES OF THE INTEREST PAGES AND
FILES.
E- COMMERCE: IS SHORT FOR ELECTRONIC COMMERCE. THE ACT OF DOING BUSINESS TRANSACTIONS
(BUYING AND SELLING) ONLINE.
DOWNLOADING: IS A TERM THAT GENERALLY APPLIES TO THE TRANSFER OF DATA FROM THE INTERNET
TO THE COMPUER OR MOBILE DEVICE.
FIREWALL: IS A BROAD TERM USED TO DESCRIBE A PROTECTIVE BARRIER AGAINST COMPUTER BUGS OR
VIRUSES.
11. KEYLOGGER: A PROGRAM THAT RUNS IN THE BACKGROUND AND STEALS USER
CREDENTIALS AND CONFIDENTIAL INFORMATION AND SEND IT BACK TO THE HACKER
BY RECORDING EVERY KEYSTROKE THAT A USER MAKES ON THEIR COMPUTER OR
DEVICE.
14. RANSOMEWARE: A RANSOM VIRUS THAT BLOCK THE USER FROM ACCESSING THE
PROGRAMS OR FILES AND DEMANDS TO PAY THE RANSOM THROUGH ONLINE METHOD
FOR THE REMOVAL OF THE VIRUS.
ASIDE FROM THE BENEFITS THAT PEOPLE GET FROM THE INTERNET, IT ALSO OFFERS MANY DIFFERENT RISKS SUCH AS
THE POTENTIAL FOR:
CYBERBULLYING
ONLINE PREDATORS
IDENTITY THEFT
SCAMS
SEXTING
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
NETIQUETTES
Make Real People a Priority