Printable PDF Version (To view this file, you must have Adobe Acrobat Reader.)
COPPA
Children's Online Privacy and Protection Act, one of several laws that have been passed to protect children who use the Internet. This law prohibits Web sites from collecting children's private information or sharing that information with others, and also strictly regulates any online direct marketing to children. Communication tools that are regulated by COPPA include e-mail, instant messaging, and chat. For more information on this law, visit the FTC's site at http://www.ftc.gov/ and search for COPPA.
Cyberspace
Anyplace users can go on the Internet, including chat rooms, Web sites, and message boards. After spending time online you might say, "I spent an hour in cyberspace."
Emoticons
Symbols that can be created with an ordinary keyboard to represent a variety of emotions or expressions, such as happiness : ) or sticking out your tongue :p.
Internet
A worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
Log-in Name
Also known as a user name, screen name, member name, alias, or nickname. It should not be your real first and last name, but something made up that you can remember but that doesn't tell anyone else who you are in real life. Preferably, your log-in name also doesn't let anyone know whether you're a boy or a girl. An example would be baseball123 or Poohbear. Your user name is your name on the Web. It hides your real identity.
Netiquette
A play on the word "etiquette," referring to correct and respectful behavior on the Internet. Behavior that is respectful in the real world is also appropriate online, like not "yelling," cursing, or insulting other people. You should never do anything online that you wouldn't do in real life.
Password
Similar to a password in real life. It is a secret word, set of numbers, set of letters, or a combination of letters and numbers that only you know. Together with your user or log-in name, your password allows you to enter some Web sites. Your password should never be shared with anyone other than your parents. You should even keep your password a secret from your best friend. Remember to choose a password that isn't easy to guess.
PDA or Handheld PC
Personal Digital Assistant. Although PDA came first, as technological advances are made, the terms "PDA" and "Handheld PC" are becoming interchangeable. A few years ago you would use your PDA to organize your phone numbers, make a few notes, and maybe maintain your schedule. Today you can use the latest versions of these devices to do all of those things plus send and receive e-mail, surf the Web, and make purchases. Soon other technologies like Gameboy by Nintendo? or Sony Playstation? will have Internet access too.
Private Information
Who you are or where people can find you in the real world. This includes your real name, address, phone number, password, the name of your school, and the name of your school's team.
Screen Name
Also known as a user name, log-in name, member name, alias, or nickname. It should not be your real first and last name, but something made up that you can remember but that doesn't tell anyone else who you are in real life. Preferably, your screen name also doesn't let anyone know whether you're a boy or a girl. An example would be baseball123 or Poohbear. Your user name is your name on the Web. It hides your real identity.
User Name
Also known as a log-in name, screen name, member name, alias, or nickname. It should not be your real first and last name, but something made up that you can remember but that doesn't tell anyone else who you are in real life. Preferably, your user name also doesn't let anyone know whether you're a boy or a girl. An example would be baseball123 or Poohbear. Your user name is your name on the Web. It hides your real identity.
Virus
A destructive computer program that is transmitted from computer to computer over the Internet, or from a computer or other device to the Internet, often through e-mail attachments. Sometimes these programs damage files, or even destroy data and programs, when they are activated. You can protect your computer by installing virus protection software, never opening e-mail attachments or shared files that look suspicious even if they come from someone you know, and checking the Web at least once a week for updates for your virus protection software.
Wireless or Wireless Device
Any number of devices -- cellular phones, personal digital assistants, handheld PCs, even computers -- that can access the Internet without being connected directly to a phone line or a cable.