To take a spyware or virus-infected file out of harm’s way by stripping its rights or by moving it to a folder that cannot be easily accessible by regular file management utilities. It is thereby […]
A hoax is information that is shared via the internet that is not true and may cause fear and instability. Always fact-check information before sharing. [The Digital Classroom Resource].
Biometrics is the use of technology to identify people based on their biological features to authenticate them for access to a computer system, such as fingerprint or retina scans and voice or facial recognition. [The […]
A chatbot is a computer program that simulates human conversation through voice commands or text chats. It is an AI feature that can be embedded and used through any major messaging applications.
A barnacle is unwanted programming, such as adware or spyware, that is downloaded and installed along with a user-requested program. The term derives from the name of a crustacean that attaches itself to whales and […]
Software piracy is the stealing of legally protected software. It occurs when copyright protected software is copied, distributed, modified or sold and denies copyright holders due compensation for use of their creative works.
Bandwidth throttling is the intentional slowing or speeding of an internet service by an ISP. It is a reactive measure used in networks to regulate network traffic and minimize bandwidth congestion.
Phishing is a cybercrime that involves sending out emails pretending to be from a reputable company, such as a bank in order to trick users to reveal personal information, such as passwords and credit card […]
A wildcard refers to a character, normally an asterisk (*) or question mark (?), that can be substituted for zero or more characters in a string.