firewall
file management
copyright law
local area network (LAN)
ethical behavior
listserve
acceptable use policy (AUP)
FAQ
file transfer protocol (FTP)
grouping
hacker
format
Special software or hardware designed to protect a private computer system from unauthorized access
A collection of common questions and answers on a particular subject
A service on the Internet that provides people who sign up on a list with email bulletins and updates on a given topic
Law granting a legal right to a copyright holder which requires the permission of the copyright holder to make non-archival copies of the work in question
Policies adopted by school districts to address acceptable Internet usage. It is an agreement between the user (students) and the school district requiring responsible use of Internet access
The protocol used to transfer files from one computer to another over the Internet. Used to upload or download files
A process used to clean and prepare a disk so that data can be stored in an organized manner. Deletes any information previously on the disk!
Knowing how to correctly create, access, save, rename, delete, and move files and folders on a computer
Selecting 2 or more objects and locking them together so the computer treats them as one object for editing
A user who breaks into files, computers, software, etc. This is illegal and is the electronic equivalent of breaking and entering
A group of computers, connected by cables set up to communicate with one another
Behavior that conforms to accepted professional standards of conduct