Information Technology

 
 

Tech Glossary

Make sure you are familiar with the following tech terms.

Adware:  Any advertisement-related software which automatically downloads and displays ads on a computer.

Browser: An application you can use to access the Internet and visit websites. Firefox, Google Chrome, Safari, and Internet Explorer, are examples of browsers.

Domain: A domain is a name for an IP address and is more commonly recognized as a website or web address. For example, adelphi.edu and google.com are domains.

Identity Theft: A criminal action in which a person uses another person’s identity for their own purposes including credit card purchases.

File Backup: The saving of files to alternative locations for loss protection. Such resources include flash drives, external hard drives and online backup servers.

Firewall: A hardware or software based device that blocks unauthorized access into a computer system.

Malware: Malicious software which when installed on a computer can cause damage. Examples include viruses, worms, Trojan horses and spyware.

P2P / File-Sharing:  Peer-to-peer is any network that connects a number of computers to one networking program, thereby allowing each user access to another computer’s files. Some examples are KaZaa, Napster and LimeWire.

Pharming: A scam that redirects users to fraudulent websites that resemble an official site.

PhishingEmails that are made to appear as though they are from a recognized source and are designed to trick you into submitting your vital information (e.g. bank account, social security, credit card numbers, and passwords to accounts).

Ransomware: (including Cryptolocker, Cryptowall, Crowti and Reveton) holds your computer files hostage until you pay a fee.

Social Media: Online communication used by large groups of people to share information. Facebook, Twitter, Pinterest and Foursquare are examples of social media.

Spam: Unsolicited, usually commercial or objectionable form of communication (e.g. using email, instant messaging, etc.) sent to a large number of recipients. These are usually harmless, yet annoying.

Spoofing: Technique used by hackers to gather personal and confidential information. Spoofing emails are usually false emails with false trustworthy senders asking for confidential information.

Spyware: Malicious software installed on your computer hard drive to collect information without the user being aware.

Virus: Emails with attachments which, when clicked on, launch harmful attacks against your computer.

 

For further information, please contact:

Office of Information Technology
p – 516.877.3340
e – helpdesk@adelphi.edu
» Video Tutorials

Tech Workshops
Take advantage of new workshops on 3D design and printing, plus learn more about Google Apps.
Check the schedule and register
3D Studio in Swirbul
The new 3D studio features cutting-edge printing, editing and scanning for 3D prototypes.
Learn about our 3D consultations
Tech News Alerts
Stay on top of IT announcements including service alerts and enhancements.
See all IT news
 
 
Apply Now
Request Information