Information Technology

 
 

Tech Glossary

Make sure you are familiar with the following tech terms.

Adware:  Any advertisement-related software which automatically downloads and displays ads on a computer.

Browser: An application you can use to access the Internet and visit websites. Firefox, Google Chrome, Safari, and Internet Explorer, are examples of browsers.

Domain: A domain is a name for an IP address and is more commonly recognized as a website or web address. For example, adelphi.edu and google.com are domains.

Identity Theft: A criminal action in which a person uses another person’s identity for their own purposes including credit card purchases.

File Backup: The saving of files to alternative locations for loss protection. Such resources include flash drives, external hard drives and online backup servers.

Firewall: A hardware or software based device that blocks unauthorized access into a computer system.

Malware: Malicious software which when installed on a computer can cause damage. Examples include viruses, worms, Trojan horses and spyware.

P2P / File-Sharing:  Peer-to-peer is any network that connects a number of computers to one networking program, thereby allowing each user access to another computer’s files. Some examples are KaZaa, Napster and LimeWire.

Pharming: A scam that redirects users to fraudulent websites that resemble an official site.

PhishingEmails that are made to appear as though they are from a recognized source and are designed to trick you into submitting your vital information (e.g. bank account, social security, credit card numbers, and passwords to accounts).

Ransomware: (including Cryptolocker, Cryptowall, Crowti and Reveton) holds your computer files hostage until you pay a fee.

Social Media: Online communication used by large groups of people to share information. Facebook, Twitter, Pinterest and Foursquare are examples of social media.

Spam: Unsolicited, usually commercial or objectionable form of communication (e.g. using email, instant messaging, etc.) sent to a large number of recipients. These are usually harmless, yet annoying.

Spoofing: Technique used by hackers to gather personal and confidential information. Spoofing emails are usually false emails with false trustworthy senders asking for confidential information.

Spyware: Malicious software installed on your computer hard drive to collect information without the user being aware.

Virus: Emails with attachments which, when clicked on, launch harmful attacks against your computer.

 
Follow Adelphi IT at:         Follow Adelphi 3D at:  

For further information, please contact:

Office of Information Technology
p – 516.877.3340
e – helpdesk@adelphi.edu
» Video Tutorials

 
 
Apply Now
Request Information