4G Is the 4th generation of cellular mobile networks. LTE stands for “Long Term Evolution” which is the technology behind 4G cellular networks. There are two major mobile network types that are in use right now: 4G LTE and 5G. The G here stands for “generation.” Before 5G rolled out, 4G LTE was the fastest mobile network technology.
5G Is the 5th generation of cellular mobile networks. There are two major mobile network types that are in use right now: 4G LTE and 5G. The G here stands for “generation.” The 3G network is the oldest still in regular use, and the 5G is the newest. 5G is currently the fastest cellular internet speed available.
Access Point
Is a device that creates a wireless local network. It connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.
An account is an arrangement by which a user is given personalized access to a computer, website, or application, typically by entering a username and password.
An ad is a type of digital marketing that utilizes social networks such as, Facebook, Twitter, and Instagram.
Address Bar
An address bar is the familiar text field at the top of a web browser’s interface (GUI) that displays the name or the URL (uniform resource locator) of the current web page. 
A set of formulas developed for a computer to perform a certain function.
Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks. Typically, most programs will use three different detection devices: specific detection, which identifies known malware; generic detection, which looks for known parts or types of malware or patterns that are related by a common codebase; and heuristic detection, which scans for unknown viruses by identifying known suspicious file structures. When the program finds a file that contains a virus, it will usually quarantine it and/or mark it for deletion, making it inaccessible and removing the risk to your device.
A mobile application, most commonly referred to as an app, is a type of application software designed to run on a mobile device, such as a smartphone or tablet computer. Mobile applications frequently serve to provide users with similar services to those accessed on PCs. Apps are generally small, individual software units with limited function.
App Store
The App Store gives people around the world a safe and trusted place to discover apps that meet our high standards for privacy, security, and content.
Arrow Keys
Arrow keys or cursor movement keys are keys on a computer keyboard that are either programmed or designated to move the cursor in a specified direction. Many keyboards also have a separate pad for these keys (look for a set of arrow keys).
A symbol (*) used to mark printed or written text.
An attachment is simply an additional file sent with an email message. An attachment can be an image file, a Word document, or one of many other supported file types. Attachments are usually represented by a paperclip symbol.
The term audience refers to groups of people with an interest in your company or product. In the case of websites, the audience consists of all visitors to a website.
The process of identifying yourself and the verification that you are who you say you are. Computers where restricted information is stored may ask you to enter your username and password to gain access.
An avatar is an image that represents a person online, most often within forums and social networks.
Bring Your Own Device or “BYOD” is a business and technology policy that allows employees to bring in personal mobile devices and use these devices to access company data, email, etc.
Back Up
The process of creating a copy of the data on your system that you use for recovery in case your original data is lost or corrupted. You can also use backup to recover copies of older files if you have deleted them from your system.
Backgrounds are graphic design components that add character to a photograph or picture to produce beautiful images or posts with unique backdrops.
Backspace Key
The key on a computer keyboard that you use to erase the text left of the insertion point, one character at a time.
A measurement of the amount of data that can be transmitted over a network at any given time. The higher the network’s bandwidth, the greater the volume of data that can be transmitted. Network bandwidth is usually expressed in bits per second (bps); modern networks typically have speeds measured in millions of bits per second (megabits per second, or Mbps) or billions of bits per second (gigabits per second, or Gbps).
A bio on social media refers to a short bit of explainer text that explains who the user is.
Blog is a word that was created from two words: “web log.” Blogs are usually maintained by an individual or a business with regular entries of content on a specific topic, descriptions of events, or other resources such as graphics or video. “Blog” can also be used as a verb, meaning to maintain or add content to a blog.
Bluetooth is a wireless technology that uses a radio frequency to share data over a short-range wireless communication between two devices, eliminating the need for wires.
Create a bookmark, or bookmarking online follows the same idea of placing a bookmark in a physical publication- you’re simply marking a website you found important, enjoyed, or want to continue reading later.
Bot is short for robot and called an internet bot – It is a computer program that operates as an agent for a user or other program or to simulate a human activity. Bots are normally used to automate certain tasks, meaning they can run without specific instructions from humans.
A computer program with a graphical user interface for displaying and navigating between web pages
Browsing History
Browsing history refers to the list of web pages a user has visited, as well as associated metadata such as page title and time of visit.
A test to prevent spamming software from accessing a website by requiring visitors to the site to solve a simple puzzle (typically by reading and transcribing a series of numbers or letters from a distorted image) in order to gain access to the site.
A Cable is an insulated wire or wires having a protective casing and used for transmitting electricity or telecommunication signals.
Caps Lock Key
A key on a computer keyboard that you press to make any letters you type appear as capital letters until you press it again.
Cellular Data
Cellular data is the provides access to the Internet when not within a Wi-Fi network. Hotspots take precedence over cellular transmission. If cellular data is turned off, users that are not in Wi-Fi range cannot access the internet. Prior to 4G LTE, cellular data could not be accessed while making a phone call on the same device.
Check boxes
Check boxes are a small box on a form into which a check or other mark is entered as the response to a question.
Is an action which is performed on a website that has been consulted by an Internet user with a simple click of a mouse.
Click and Hold
The action of clicking your computer’s mouse on an object and holding the mouse button down, but not releasing it. Depending on what you click upon, this may bring up an additional menu or list of selections you can make by pulling the mouse down and releasing the button.
The “cloud,” refers to software and services that run on the Internet instead of your computer. Apple iCloud, Dropbox, Netflix, Amazon Cloud Drive, Google Drive, Microsoft Office 365, Yahoo Mail are all cloud-based services.
Cloud Printing
Cloud printing can be described as a service that allows users to print from any device on the network. Cloud printing connects digital devices like smartphones, laptops, tablets, and workstations with printer stations.
A comment is a response that is often provided as an answer or reaction to a blog post or message on a social network. 
A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.
Anything that someone has posted or shared with others.
A small text file sent to your computer by a web site you have visited. These can be very useful in that they can allow the web site to recognize who you are when you return. Cookies cannot store viruses or other threats, although they can be used to track your activity across different web sites in order to provide, for example, “targeted” advertisements.
To duplicate a file, document, folder, or selected text in another location.
The symbol used to point to some element on screen. On Windows, Mac, and other graphics-based screens, it is also called a “pointer,” and it changes shape as it is moved with the mouse into different areas of the application. For example, it may turn into an I-beam for editing text, an arrow for selecting menus or a pen for drawing.
Cyber Attack
A deliberate assault against a computer system, mobile device, or network. The goal of a cyberattack may be to deny service from a website, penetrate a computer or a network to steal sensitive data, or just plain vandalism.
Cyber Security
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security.
DSL stands for Digital Subscriber Line. It utilizes standard copper phone lines from homes and businesses to transmit data.
Technically, data are raw facts and figures, such as orders and payments, which are processed into information, such as balance due and quantity on hand. In common usage, however, the terms “data” and “information” are used synonymously.
A collection of information organized so that a computer application can quickly access selected information; it can be thought of as an electronic filing system. Traditional databases are organized by fields, records (a complete set of fields), and files (a collection of records). Alternatively, in a Hypertext database, any object (e.g., text, a picture, or a film) can be linked to any other object.
The pre-set value or action taken by software. Application programs have many defaults, including margin settings, font style, the printer that should be used and the folder name for saving files. Although pre-determined by the vendor, a default setting can be changed by the user (see settings).
To remove an item of data from a file or to remove a file from the disk.
On computers like IBM PC or compatibles and Macintoshes, the backdrop where windows and icons for disks and applications reside.
Input devices include things like microphones, keyboards, mouse, touchpads, wheels, joysticks, etc. Output devices include printers, monitors, projectors, and speakers.
Dialog Box
The window that “pops up” when you select a function from a menu is officially known as a “dialog box.” 
Digital Divide
The economic, educational, and social inequalities between those who have computers and online access and those who do not.
Digital Equity
A condition in which all individuals and communities have the information technology capacity needed for full participation in our society, democracy, and economy. Digital equity is necessary for civic and cultural participation, employment, lifelong learning, and access to essential services.
Digital Footprint
The history of a person’s usage of digital devices, which includes, among others, TV movies and programs watched, Web pages downloaded, websites logged into, text, chat and social media messages sent, links clicked, and Facebook pages liked. Also called a “digital fingerprint,” this information is widely used to target ads to consumers. In addition, credit card transactions and cellphone call also create a digital footprint that can be used to track a person’s whereabouts.
Digital Literacy
The ability to find, create, and share information using a desktop, laptop, tablet, or smartphone.
Digital Transformation
The adoption of digital technology by a company with the goal for its implementation being to improve efficiency, value, or innovation.
Direct Message/DM
To send someone a private message on social media, especially Twitter.
A base station onto which a device is placed, such as docking your phone to charge it on a wireless charger.
Part of an Internet address. The network hierarchy consists of domains and subdomains. At the top are several major categories (e.g., com, Edu, gov); next are domains within these categories (e.g., Ohio-state); and then there are subdomains. The computer name is at the lowest level of the hierarchy.
Double Click
Press a computer mouse button twice in quick succession to select a file, program, or function. “To run a window just double-click on the icon.”
Downloading is the process of getting web pages, images and files from a web server.
Drag and Drop
The capability that lets a user perform operations by moving the screen icon of an object into another window or onto another icon. On a regular screen, the icon is clicked with the mouse, and the button is held down while dragging. On a touchscreen, the icon is long tapped and held down while dragging.
Drop-Down Menu
The common type of menu used with a graphical user interface (GUI). Clicking a menu title causes the menu items to appear to drop down from that position and be displayed. 
Electronic Health Record OR Electronic Health Record OR Personal Health Record. These three are together because people often use them interchangeably. EMR stands for Electronic Medical Record, EHR stands for Electronic Health Record and PHR stands for Personal Health Record.
An ebook is an electronic version of a book.
To make a change to data. The terms edit and “update” are used synonymously.
Electronic Mail
Email Address
An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a computer network. Example: ilovedigitaliteracy@literacycny.org
Email Provider
An email service provider is a technology vendor that offers enterprise-level marketing via an email channel. Examples include Gmail, Apple Mail, Yahoo, etc.
Embed or Embedded means an existing or firmly attached within something or under a surface.
Emojis are small cartoonish images that can be sent along with text in social media and private messages. 
To turn on or activate.
The manipulation of data to prevent accurate interpretation by all but those for whom the data is intended.
Physical devices that connect to and exchange information with a computer network, such as desktops, mobile devices, virtual machines, and servers.
Endpoint Security
Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats. 
Enter Key
Also called the “Return key,” it is the keyboard key that is pressed to signal the computer to input the line of data or the command that has just been typed.
Ethernet is the standard wired network technology in use almost everywhere today. An Ethernet cable carries the broadband signals between your modem, router, computer, and other wired internet-capable devices.
External Link
An external link is often described as any link that goes to a different domain.
 FaceTime is an application used to make video calls to other people using a Mac computer, iPhoneiPad, or iPod. Originally, FaceTime could only be used with Apple products (not Windows or Android devices), but has since been updated to allow users from other platforms to join via web links.
A file is an object on a computer that stores data, information, settings, or commands used with a computer program.
File Explorer
File Explorer, previously known as Windows Explorer, is a file manager application and default desktop environment that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems.
Refers to:
1) a program that has the function of translating data into a different format (e.g., a program used to import or export data or a particular file);
2) a pattern that prevents non-matching data from passing through (e.g., email filters); and
3) in paint programs and image editors, a special effect that can be applied to a bit map.
A firewall is a piece of software or hardware that blocks certain types of traffic. For example, a firewall could block incoming traffic on a certain port or block all incoming traffic except traffic coming from a specific IP address.
Flash Drive
This is a small portable hard drive that plugs into a USB port and allows you to transport files between different computers. Also called a thumb drive.
The logical subdivision of a storage device, which gives the user the illusion of a paper file folder with endless capacity (the shape of a folder icon is a paper folder). Folders are created by both software and users, and all of storage is a hierarchy of folders. 
In a social media setting, a follower refers to a person who subscribes to your account in order to receive your updates. 
A set of type characters in a particular design and size. Each typeface, such as Times Roman, Helvetica and Arial, is typically made available in four variations: normal weight, bold, italic, and bold italic. 
Force Quit
To terminate an application that is not responsive. Keystroke combinations activate the system utility that enables the user to force quit the app. The Windows and Mac key commands are CTRL+ALT+DEL and Command-Option-Escape, respectively.
Friends is the term used on Facebook to represent the connections you make and the people you follow. These are individuals you consider to be friendly enough with you to see your Facebook profile and engage with you.
When your device freezesthe software loses control over the application or tries to run the application in a way the Windows operating system doesn’t recognize. 
GIF is an acronym for Graphics Interchange Format. In social media, GIFs serve as small-scale animations and film clips.
A free web-based email service that provides users with 15 GB of free storage for messages and the ability to search for specific messages. Gmail, otherwise known as Google Mail, can be accessed from a personal computer, tablet or any Android or iOS device.
Google Calendar
A time-management and scheduling calendar service developed by Google.
Google Chrome
Google Chrome is a free web browser produced by Google that fully integrates with its online search system as well as its other applications.
Google Docs
Google Docs is an online word processor included as part of the free, web-based Google Docs Editors suite offered by Google, Google Docs is a free alternative to Microsoft Word by Windows.
Google Drive
Google Drive is a cloud-based file storage service from Google. It also offers a free software suite that includes a word processor, and many others for spreadsheets, presentations, drawing, and several others.
Google Forms
Google Forms is a survey administration software included as part of the free, web-based Google Docs Editors suite offered by Google. 
Google Meet
A video communication service developed by Google. Anyone with a Google Account can create a video meeting with up to 100 participants and meet for up to 60 minutes per meeting for free. Meetings beyond 60 minutes and/or 100 participants are available by subscription.
Google Sheets
Google Sheets is a spreadsheet program included as part of the free, web-based Google Docs Editors suite offered by Google. Google Sheets is a free alternative to Microsoft Excel by Windows.
Google Slides
Google Slides is a presentation program included as part of the free, web-based Google Docs Editors suite offered by Google. Google Slides is a free alternative to Microsoft PowerPoint by Windows.
HyperText Markup Language (HTML) is a programming language for web pages.
Source code in a program. For example, the phrase “it must be done through a hack” means someone must write programming code to solve the problem because there is no pre-written software that does the job.
Handle is the term used to describe someone’s @username on Twitter. For example, LiteracyCNY’s Twitter handle is @LiteracyCNY. 
Hard Drive
A primary computer storage device, which spins, reads, and writes one or more fixed disk platters.
Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.). In operation, a computer is both hardware and software, and one is useless without the other.
A hashtag is a tag used on a variety of social networks as a way to annotate a message. A hashtag is a word or phrase preceded by a “#” (ex: #DigitalLiteracy). Social networks use hashtags to categorize information and make it easily searchable for users. 
To select an item in a menu, on the desktop or within an application to copy, move, delete, mark, or launch it. Highlighting is typically accomplished by pointing to the object with the mouse and clicking the left mouse button.
The first page retrieved when accessing a website or the first screen displayed when a smartphone or tablet is started. It provides the main menu and starting point for the rest of the content on the site or device. 
To move the mouse pointer (cursor) over an object and hold it there.  
A hyperlink typically refers to an icon or text on a Web page that, when clicked or tapped, transfers the user to another part of the page or to another page on the current website or to a completely different website. 
The I-beam pointer (also called the I-cursor) is a cursor shaped like a serifed capital letter “I”. The purpose of this cursor is to indicate that the text beneath the cursor can be highlighted and sometimes inserted or changed.
IP Address
An Internet Protocol address, or IP address, is a numerical address that corresponds to your computer on a network. When a computer wants to connect to another computer, it connects to that computer’s IP address.
A small graphic symbol on a screen that represents an action or a resource such as an application, file, folder, menu, or setting.
An inbox is a repository in an email application that accepts incoming messages. 
Incognito Mode
Incognito mode, also known as private browsing is a privacy feature in some web browsers. When operating in such a mode, the browser creates a temporary session that is isolate from the browser’s main session and user data. Browsing history is not saved, and local data associated with the session, such as cookies, web cache, are cleared when the session is closed.
Installation (or setup) of a computer program (including device drivers and plugins), is the act of making the program ready for execution. Installation refers to the configuration of a software or hardware with a view to making it usable with the computer.
An interface establishes a physical connection between two computer systems, a conversational syntax, a format for logical messages passed between the systems, and a data-encoding structure understood by both systems.
The internet is a global network of billions of computers that allows digital information to travel around the world. The information is translated into code, then sent through a network of cables, servers, data centers, satellites and cell towers to another computer or connected device.
iOS is a mobile operating system for Apple-manufactured devices. iOS runs on the iPhone, iPad, iPod Touch and Apple TV.
A portable computer with an LCD screen that weighs from two to 10 pounds. It uses batteries for mobile use and AC power for charging and desktop use. 
Refers to the standard action of selecting a link, button, etc. with the left button of a standard computer mouse.
A Like is an action that can be made by a Facebook or Instagram user. Instead of writing a comment or sharing a post, a user can click the Like button as a quick way to show approval.
Live Stream
Live streaming is the act of delivering content over the internet in real-time. 
A login authenticates a user when logging into an online account over the Internet.
Going through the procedures to conclude use of a computer, database, or system.
Mac OS
The name of Apple’s Unix-based operating system for Mac desktop and laptop computers. 
Mail Server
A networked computer dedicated to supporting electronic mail. You use a client program like Microsoft Outlook for retrieving new mail from the server and for composing and sending messages.
A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Examples include viruses, spyware, and trojan horses.
A feature of a graphics-based operating system that enlarges the window to the size of the screen.
Mbps (Megabites per second) refers to how fast a file is downloaded to your device, and how fast one can be uploaded to the internet.
A meme on the internet is used to describe a thought, idea, joke, or concept that’s widely shared online. It is typically an image with text above and below it, but can also come in video and link form.
An on-screen list of available actions a user can perform in a software program. Menu titles may appear as text, icons or both, and selection is made by clicking or tapping the title and selecting from the list.
Menu Bar
An on-screen list of available actions a user can perform in a software program. Menu titles may appear as text, icons or both, and selection is made by clicking or tapping the title and selecting from the list.
Microsoft (MS)
Abbreviated as MS, The most successful software company in the industry. Microsoft’s software and Intel’s hardware pioneered the PC and revolutionized the computer industry.
Microsoft (MS) Excel
A full-featured spreadsheet for Windows, macOS, iOS and Android from Microsoft. Part of the Microsoft Office suite, Excel can link spreadsheets for consolidation and provides a wide variety of business graphics and charts for creating presentation materials. Google Sheets is the free equivalent of Excel.
Microsoft (MS) Teams
Also referred to as simply Teams, is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration.
Microsoft (MS) Word
Microsoft Word is a word processing program that allows for the creation of both simple and complex documents. Google Docs is the free equivalent of Word.
Microsoft Powerpoint (MS)
PowerPoint is a presentation program developed by Microsoft that creates a slide show of important information, charts, and images for a presentation. Google slides is the free equivalent of PowerPoint.
A feature of a graphics-based operating system that hides the application currently on screen.
Similar to a television screen, the monitor allows you to see the data on your computer.
The primary pointing device on a desktop computer. Laptops have the equivalent function in a built-in trackpad/touchpad, although many users prefer the handheld mouse.
Navigation Bar
A navigation bar is a section of a graphical user interface intended to aid visitors in accessing information. Navigation bars are implemented in operating systems, file browsers, web browsers, apps, web sites and other similar user interfaces.
A group of interconnected computers capable of exchanging information. A network can be as few as several personal computers on a LAN or as large as the Internet, a worldwide network of computers.
A news feed is literally a feed full of news. On Facebook, the News Feed is the homepage of users’ accounts where they can see all the latest updates from their friends. The news feed on Twitter is called Timeline.
An indicator that an event has occurred. Notifications are a major feature of smartphones and tablets, informing the user that an event such as a text message, email, weather, news headline or social media update is now available on the device.
Operating System (OS) refers to the powerful program that controls and coordinates a computer’s hardware devices and runs software and applications. Examples include Windows, Android, and Linux.
Short for personal computer.
A secret word or code used to serve as a security measure against unauthorized access to data. It may be used to log onto a computer, mobile device, network or website or to activate newly installed software in the computer. 
To insert selected data into the application at the current cursor location. A paste operation must be preceded by a copy operation, which places the selected data into the clipboard. 
Personal Identity Information (PII)
Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.
The fraudulent practice of attempting to acquire sensitive data or personal information including passwords, credit card numbers, etc. While phishing commonly occurs through email, phishing attempts are also made by phone, through text messages, and direct messages (aka DM’s) on social media. Sometimes, the phishing attempt appears to be from someone you know or from a company you’re doing business with.
A small window that is displayed on top of the existing windows on screen. A popup window can be used in any application to display new information; however, the term often refers to an advertisement. 
In computer hardware, a port is the jack or receptacle for a device to plug into. These are standardized for each purpose. Some common ports are USB ports, USB-C ports, and Ethernet ports.
Privacy Settings
Are the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees your information.
Private Browsing
Private browsing, also known as incognito mode is a privacy feature in some web browsers. When operating in such a mode, the browser creates a temporary session that is isolate from the browser’s main session and user data. Browsing history is not saved, and local data associated with the session, such as cookies, web cache, are cleared when the session is closed.
Processor Speed
Measured in gigahertz (GHz) the higher the rating, the higher the performance of the computer’s processor.
Processor/Central Processing Unit (CPU)
Provides the instructions and processing power the computer needs to do its work. The more powerful and updated your processor, the faster your computer can complete tasks.
Social profiles are a description of individuals’ social characteristics that identify them on social media sites such as LinkedIn and Facebook.
Profile Picture
A profile pic is a photo that appears in your online accounts, regardless of whether it’s a social media or professional site. Each social media site has its own unique way of displaying profile pictures.
Random Access Memory (RAM)
Measured in size by gigabytes (GB), RAM stores short-term data that a PC requires to properly operate. The more RAM a device has, the better it will perform.
To switch a computer off and on again, allowing its operating system and programs to be reloaded. 
One who receives. The person to whom an email message is sent is the recipient.
Recycle Bin (Windows Device)/Trash (Apple Devices)
A simulated garbage can used for deleting files and folders. The recycle bin keeps the files intact in case the user wants to restore them but can be “emptied” from time to time to save disk space.
In general, refresh is a way of describing reloading or updating what is being displayed or stored.
To restore a device to its original configuration. A reset button on a router or other electronic device changes every setting the user might have made to restore the default factory settings, otherwise known as “out of the box.”
To return hardware or software to a previous state. 
Refers to clicking and displaying the additional or special options that apply to your selection with the right button of a standard computer mouse. Right-click often makes a menu appear with choices that apply to a current selection or program.
A device used for connecting two Local Area Networks (LANs); a device that passes traffic back and forth. You likely have a home router. It’s that router’s job to pass outgoing traffic from your local devices to the Internet, and to pass incoming traffic from the Internet to your devices.
SIM Card
Short for Subscriber Identity Module, a SIM card is an integrated circuit used in cell phones, and other mobile devices, to store subscriber information.
A dishonest scheme.
A document or image formed by scanning something electronically and to a designated electronic location.
A flat panel or area on an electronic device such as a television, computer, or smartphone, on which images and data are displayed.
Scroll Up/Scroll Down
Scrolling up or down refers to the action of using a cursor (on a PC) or your finger (on a tablet or smartphone) to navigate what is on your device’s screen. A scroll wheel is a wheel used for scrolling. The term refers to the wheel found on a computer mouse (where they can also be called a mouse wheel).
Search Bar
The location within a browser or website that lets you search for what you want to find.
Search Engine
A search engine is software accessed on the Internet that searches a database of information according to the user’s query. The engine provides a list of results that best match what the user is trying to find. Examples include Yahoo, Google, and Bing.
Shift Key
The Shift key is a modifier key on your computer keyboard. When you press it by itself, it does not produce a character or move the position of the cursor. However, if you hold down the Shift key and press a letter key, uppercase letters are generated instead of lower-case letters.
A small file that takes up very little space because it only has information about the location of the original file. 
A process by which a computer user logs off or out of an account.
The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
Social Media
Websites and applications that enable users to create and share content or to participate in social networking. Examples include Facebook, Instagram, and Twitter.
These are the programs (applications) that allow the computer to operate or do certain tasks.
Spacebar Key
The Spacebar is the wide key at the bottom of a computer keyboard or typewriter that is used to make a space.
 Unsolicited emails sent to many recipients.
Spyware is a type of malware that attaches itself and hides on a computer’s operating system without your permission to make unwanted changes to your user experience.
Start Menu
When using a Windows OS machine, the Start menu provides access to every program installed on the computer. To open the Start menu, click the Start menu button at the bottom-left corner of the screen or press the Windows key on the keyboard.
Storage Capacity
Measured in gigabytes (GB), this refers to the capacity of the storage on a device, i.e. how many photos, videos, documents, etc. your device will store.
Streaming refers to any media content – live or recorded – delivered to computers and mobile devices via the internet and played back in real time. Podcasts, webcasts, movies, TV shows and music videos are common forms of streaming content.
Suspicious network activity can refer to several behaviors involving abnormal access patterns, database activities, file changes, and other out-of-the-ordinary actions that can indicate an attack or data breach.
The term (digital) system refers to elements such as hardware, software and networks and their use.
System Preferences
System Preferences is an application bundled with OS X that allows you to change settings on your Mac. It is like the Control Panel in Windows.
System Unit
A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations.
In computer software (e.g., Internet browser), a tab is a clickable area at the top of a window that shows another page or area. When a tab is clicked, the tab’s contents are shown, and any other open tab is hidden.
Tagging is a social media functionality commonly used on Facebook and Instagram that allows users to create a link back to the profile of the person shown in the picture or targeted by the update. 
Thumb Drive
This is a small portable hard drive that plugs into a USB port and allows you to transport files between different computers. Also called a flash drive.
In a program with a graphical user interface, a toolbar is a strip of icons used to perform certain functions.
A Trackpad (or touchpad) is a touch-sensitive interface surface that allows you to manipulate and interact with your laptop computer through finger gestures. As laptops typically do not include mice, the Trackpad provides an alternative way to move the cursor around the screen, select and open applications or programs, highlight text, interact with web browsers, and more.
In computing, the trash is a graphical user interface desktop metaphor for temporary storage for files set aside by the user for deletion, but not yet permanently erased.
To troubleshoot is to trace and correct faults in a mechanical or electronic system.
A post on twitter that may contain photos, GIFs, videos, links, and text.
Two-Factor Authentification
Two-factor authentication is a security system that requires two separate, distinct forms of identification to access something. The first factor is a password and the second commonly includes a text with a code sent to your smartphone, or biometrics using your fingerprint, face, or retina.
To track or tracking is the act or process of following something or someone.
USB Port
An interface used for connecting a Universal Serial Bus (USB) device to computer; these ports support plug and play.
A feature of a computer program that allows a user to cancel or reverse the last one or more commands executed. This featured is represented by an arrow pointing toward the left in most programs.
Unfollowing someone means you will no longer see their content in your feed. If they have a public account, then you may still be able to see what they post by visiting their profile directly.
To remove (someone) from a list of friends or contacts on a social networking website.
Uninstall is to remove (software) from a computer system especially by using a specially designed program.
In email marketing, to unsubscribe means to remove your email address from a company’s mailing list so as not to receive any further emails or communications.
An update is new, improved, or fixed software that replaces older versions of the same software.
Uploading is the process of putting web pages, images and files onto a web server or device.
A name used in conjunction with a password to gain access to a computer system or a network service.
Using a VPN or “virtual private network” creates an encrypted connection with the internet to improve your data security and privacy. VPNs help keep communications and data safe, even when transferred over public networks, by isolating and protecting it.
Viral is a term used to describe an instance in which a piece of content — YouTube video, blog article, photo, etc. — achieves noteworthy awareness. Viral distribution relies heavily on word of mouth and the frequent sharing of one particular piece of content all over the internet.
A type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about computer viruses is that they are designed to spread across programs and systems
Vishing (Voice Phishing)
Voice phishing, or vishing, is the use of phonecalls to conduct phishing attacks. Landline telephone services have traditionally been trustworthy; terminated in physical locations known to the telephone company and associated with a bill-payer.
VoLTE or “Voice Over LTE” refers to calls made over the 4G LTE network. They have superior audio quality to regular phone calls made over the standard voice network. VoLTE lets you talk and use 4G LTE cellular data simultaneously while on a phone call.
Web Address/URL
A Uniform Resource Locator (URL) is a web address of a specific web page or file on the Internet. An example is https://www.literacy.org.
Web Browser
A computer program with a graphical user interface for displaying and navigating between web page.
A wireless technology used to connect computer, tablets, smartphones, and other devices to the internet.
On a graphical user interface system, a rectangular area on a display screen. Windows is particularly useful for multitasking systems which allow you to perform several different tasks simultaneously. Each task has its own window which you can click on to make it the current process. Contrast to a “dialog box” which is used to respond to prompts for input from an application.
A casual way of referring to the Microsoft Windows operating systems.
Word Processor
A word processor is a software program capable of creating, storing, and printing typed documents.
Zoom in/out
To make the image of something or someone appear much larger and nearer, or much smaller and further away.