A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The Australian Communications and Media Authority (ACMA) is responsible for the regulation of broadcasting, the internet, radiocommunications and telecommunications.
The ACMA’s responsibilities include:
- promoting self-regulation and competition in the communications industry,
while protecting consumers and other users
- fostering an environment in which electronic media respect community standards
and respond to audience and user needs
- managing access to the radiofrequency spectrum
- representing Australia’s communications interests internationally.
This is a file of information that is sent with an email. It may contain text, photos, graphics, sound or video.
The word blog is derived from the combination of the two words, web and log. Blogs are virtual diaries created by individuals and stored on the internet. Blogs generally consist of text and images and can appear in a calendar type format.
Sometimes referred to as a high speed internet, broadband is an ‘always on’ fast connection to the internet. Today there are a wide variety of broadband technologies available in most areas. Two of the more commonly used technologies are cable and DSL broadband.
A software program that allows you to explore the internet in an easy-to-use way. Examples of popular browsers are Netscape and Internet Explorer.
CD-ROM (Compact Disk - Read Only Memory)
A compact disk can store large amounts of information and is inserted into a computer’s CD-ROM drive. For example, the CyberQuoll internet safety program has been copied on to a CD-ROM.
A chat room is a place on the internet where people with similar interests can meet and communicate by typing messages on their computer. People can often enter an unmoderated chat room without any verification of who they are. Problems for students can arise with chat room participants pretending to be someone they are not.
The use of Information and Communication Technologies (ICT), particularly mobile phones and the internet, to deliberately upset someone else.
The online world of computer networks.
By downloading something, such as a music file, document, or photo, you are transferring information from the internet to your computer.
E-crime is where computers or other electronic communications devices, for example mobile phones, are used to commit an offence, are the target of an offence or act as a storage device
in an offence.
Email is a service that lets you send a message, like a letter, to another person over the
internet. The message is stored on a computer and is read when the recipient checks their mail.
This is a little like checking your real mailbox.
Emoticons is a word derived from the two words emotions and icons. Emoticons are a shorthand method of explaining a feeling on the internet. Emoticons can be used in any communication over the internet but are particularly popular with chat rooms and instant messaging. Here’s an example
of an emoticon :) = happy.
A filter manages access to online content. A filter can restrict times when the internet can be accessed and also restrict what is viewed and downloaded. Some filters can also be instructed to specifically block information from being displayed. Types of filters range from home filters to filters used by a school on its server.
Firewalls can limit and stop access to computers by unauthorised people or systems. A personal firewall can be installed on your home computer to protect it from intruders on the internet. Firewalls can be used to stop the spread of viruses and spam and can be a valuable tool in protecting children online.
Flaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text. Flaming which is also known as flame wars, occurs in unmoderated chat rooms. The majority of chat rooms remain open—messages are posted automatically with no human intervention.
Handle (see also Username)
A handle is a name for a person that is used in the online world. When a person signs up for a service such as Hotmail or ICQ, they are required to create a unique identifier—a handle. When in a chat room you should always use a handle.
Identity theft occurs when somebody steals your name and other personal information for fraudulent purposes. Identity theft is a form of identity crime (where somebody uses a false identity to commit a crime).
An instant messaging program is one that can instantly send messages from one computer to another by means of small pop-up windows. They are a form of instant email and are very popular with students and adults alike.
The internet is a global communication network that enables computers and people to share information and interact. Pictures, movies, text and voice can easily be transmitted across the internet via a range of services such as email or the world wide web. There is no central home for the internet as it has been designed to operate from many geographically different locations. Anybody can connect to the internet if they have an internet-ready computer and an account with an internet service provider or ISP.
Internet acronyms are acronyms that are used specifically on the internet or mobile phones as a method of communication. They are popular because they save people time in preparing messages. It is quicker, for example, to type in one acronym that is easily understood, than it is a series of words.
All forms of information including text, pictures, animation, video and sound recording, and may include software.
Mobile internet-enabled devices
Mobile devices such as phones that are now able to access the internet, take photographs and sometime record sound.
Netiquette is derived from the two words, internet and etiquette. Netiquette describes the rules for how one should act online especially in newsgroups, forums and chat rooms. Netiquette can also be applied to email creation and transmission.
Newsgroups are also known as online forums and are places on the internet where people can contribute to a discussion by leaving a message of interest. Newsgroups exist on thousands of topics, and are useful for building online communities and bringing together people with similar interests. Unrestricted or unmoderated newsgroups pose significant safety risks for students.
When someone is online, he/she is connected to the internet. People communicate online by sending and receiving information via email, instant messaging or a chat room. Offline is another term for the real world, outside the internet.
A password that you use on the internet works in a similar way to a password you may use in real life. For example, you may have a password for your video/DVD store, or a bicycle chain lock to protect your belongings from theft or damage. When using a computer you may need to enter your password to open it.
On the internet, you usually have an email account password. Passwords protect your computer from misuse, as well as protect your privacy.
A password can consist of a secret word, set of numbers, set of characters, set of letters, or a combination of these that only you know. Your password should never be given to anyone other than your parents or carer. You should get into the habit of password protecting all blogs and websites you may create. This will ensure that only people you authorise can access the site.
Peer-to-peer (P2P) networking
Peer-to-peer networking (P2P) is an application that runs on a personal computer and shares files with other users across the internet. P2P networks work by connecting individual computers together to share files instead of having to go through a central server.
Personal information is anything that can identify you, such as name, address, telephone number, mobile number, age, what school or sports club you attend, your email address, password, username, bank account or credit card details and who your family is.
Phishing or phising, is the practice where a scammer, who is pretending to be from a legitimate organisation, sends misleading emails requesting personal and financial details from unsuspecting people.
Pop-ups are small windows that appear in the foreground of an internet browser. Pop-ups are often used to display advertising or unwanted content on the screen; however, they can be integrated into some websites for practical purposes.
Safe zones are an alternative to filtering or labelling. Labelling allows web developers to categorise online content on the basis of language, violence, sexual content, and so on. Safe zones are services providing access to a range of sites, which are suitable for children.
Spam is the email equivalent of junk mail or nuisance phone calls. Spam can simply be defined as unsolicited electronic email, instant messaging, SMS or MMS (text and image-based mobile phone messaging) of a commercial nature which is sent to individuals/organisations that have not consented to receive it.
Spyware is a computer program that can be installed on personal computers, usually without the permission from the owner, which collects information and sends it back to another source—usually an internet marketing or pornographic website
Stranger danger is the term used to describe the potential dangers in meeting a stranger online. Adults may pretend to be children in chat rooms or other internet services. It is important for students to realise they may not be communicating with the person they think they are.
Information on the internet may misrepresent the truth, be out of date, biased or just incorrect.
Means electronic mail that was not requested by the recipient and is of an advertising or promotional nature.
URL stands for Uniform Resource Locator that is the address of a file of content on the internet. All URLs begin with www (world wide web), followed by the name of the company or product. For example, the URL for CyberQuoll is:
Means a user of the internet.
Username (see also Handle)
A username is a name for a person that is used in the online world. When a person signs up for a service such as Hotmail or ICQ, they are required to create a unique identifier—a username. When in a chat room you should always use a username.
A virus is a computer program that is designed to cause an undesirable effect on a computer system. Viruses are usually disguised as something else. Viruses are often designed so that they can be transferred from one computer to another without the users knowing. They can be hidden in emails, on CDs or in files that are shared across the internet.
Computer viruses can cause harm to computer systems and need to be avoided.
Means a file of content accessible on the world wide web by requesting a single URL.