topamax 50 mg side effects

معجم سايبر سي 3

Term Definition
3G An acronym for Third Generation, it is a family of mobile telecommunications standards as defined by the International Telecommunication Union.
AUP A set of rules that lists down acceptable ‘netiquette’ or behavior as well as do’s and don’ts for users to utilize a network, website, computer system or digital device in an organization.
Advanced Fee Fraud A type of scam that requests an upfront fee with the promise of a larger sum of money. A well-known case of advance fee fraud is the 419 or Nigerian fraud.
Aiding and Abetting Help committing a cyber crime.
Anonymity Derived from the Greek word anonymia, it means “without a name” or “namelessness”.
Antivirus Software Programs to detect and remove computer viruses.
Asynchronously Not existing or occurring at the same time.
Auction Fraud Abusing auctions that are conducted by online auction sites in order to commit fraud and gain illegal funds.
Backup A copy of one or more files created as an alternate in case the original data is lost or becomes unusable.
Bandwidth A range of frequencies within a given band that is used for transmitting a signal.
Broadband A high-capacity transmission technique using a wide range of frequencies, allowing a large number of messages to be communicated at the same time.
Cellular Phones A mobile phone.
Child Pornography Spreading pornographic pictures or films of children illegally through the Internet.
Cognitive Disability A delay in intellectual development or mental retardation.
Compulsive/Impulsive Online Buying Extreme online shopping which could result in financial difficulties.
Computer Vision Syndrome A temporary condition caused by looking at the computer display for a long period of time. Some symptoms include headaches, blurred vision, neck pain, tiredness, eye strain, dry or irritated eyes and double vision.
Copyright Infringement Using copyright-protected material in a way that challenges the exclusive rights of the owner. These includes copying, reproducing, selling the copyright-protected work.
Copyright Protected Exclusive legal rights that protect works of authorship, composition or artistry.
Cracker A term used to describe a person who breaks into a system with the intention to cause damage or steal data.
Credit Card Fraud Using someone else’s credit card without authorization to purchase goods or services.
Cumulative Trauma Disorder A medical condition that refers to an injury of the musculoskeletal and nervous systems that may be caused by repetitive tasks, forceful exertions, vibrations, mechanical compression (pressing against hard surfaces), or sustained or awkward positions.
Cyber Hijacking To takeover someone’s personal computer, browser, webpage, modem or instant messenger.
Cyber Stalking Following someone online with the intention of making him or her afraid for their safety.
Cyber-bullying Harassing individuals or groups online for personal purposes.
Cyber loafing Generally refers to staff who use their work Internet access for personal reasons while pretending to work.
Cyber terrorism Using computers and the Internet to cause harm or disturbances (usually to governments and businesses) for political, religious or other personal vendettas of the attacker.
Data Interception Interruption of data during transmission.
Data Modification Alteration of data.
Data Ports A device used to connect a computer to a service running on a distant server.
Data Protection Legislation A specific law that protects personal data in computers from being misused.
Data Theft Taking or making copies of data illegally, ignoring the fact of whether it is protected by copyright, privacy or other laws.
Dial-up Connection A method of accessing the Internet using a telephone network.
Digital Footprint Trail or traces that people leave online.
Education Scam Selling worthless academic qualifications or promising a grant of scholarship with the condition of paying an upfront fee.
Email Bombing A form of attack by sending massive amounts of email to a specific person or system, which may cause the mailbox to flood or the server to stop functioning.
Employment Scam Offering employment opportunities which seem attractive but actually requires the job seeker to advance an amount of money.
Fair Use A legal policy that allows portions of copyrighted materials to be used without permission of the copyright owner provided the use is fair and reasonable.
Fiber Optics The use of thin flexible fibers of glass or other transparent solids to transmit light signals for telecommunications.
Firewall Computer hardware or software that prevents unauthorized access to private data by external computer users.
Fraud A deliberate deception which causes another person to suffer damages, usually monetary losses.
Fraudsters People who commit fraud.
Gadgets A small electronic device or tool.
Global Information Infrastructure A developed communications framework that is intended to connect all telecommunications and computer networks world-wide.
Hacker A person who breaks into other computer systems without malicious intent.
Hearing Impairments A condition where there is a defect in the ability to detect sound.
Hoax A prank that tricks people into believing or accepting something false as genuine.
Hotspots A public place where a wireless signal is made available so people can access the Internet.
Identity Theft Stealing other people’s identities by using credit card numbers, social security numbers, driving license numbers, and other personal identification numbers.
Infographic A visual representation of information or data, e.g. as a chart or diagram.
Infrastructures The fundamental facilities and systems serving a country, city, orarea, as transportation and communication systems.
Instant Messaging An online facility that allows instant exchange of typed messages between computer users in real time via the Internet using computers, mobile phones, PDAs and other digital tools.
Intellectual Property Property (as an idea, invention, or process) that derives from the work of the mind or intellect.
Language Disability Problems with age-appropriate reading, spelling, and/or writing.
Libel A false statement by written or printed words and pictures that damages someone’s reputation.
Literacy A person’s ability to read and write.
Internet Addiction A psychological addiction to the Internet which could affect learning performance, real social interaction and health.
Loan Scam Deceiving people into thinking that they may borrow money, regardless of any bad credit card history, as long as they pay an upfront fee.
Lottery Scam Using digital media such as e-mail and sms to trick people into thinking that they have won a lottery. The recipients will be instructed to contact a specified agent and pay a fee. However, they will never receive any money in return.
Malicious An intention to do harm.
Malware A type of malicious software that prevents users from using their computer functions. Some malwares also steal personal information and send it to unknown parties through the Internet. Common forms of malware are computer viruses, Trojan horses, spyware, worms, dialers and browser hijackers.
Mobile Subscribers A term for people who have an account with mobile service providers.
Money Laundering The act of using technology to transfer money electronically and concealing its illegal origins.
Motor Impairments A condition where there is a loss or limitation of function in muscle control or movement.
Multimedia Using computers to present text, graphics, video, animation, and sound in an integrated way.
Multi-tasking Performing several tasks at one time.
Network Attack Attempts to bring down a particular network, making it almost completely inaccessible to users.
Network Interference Preventing others from accessing a network.
Network Intrusion A form of unauthorized access into a particular network.
Network Sabotage Modifying or destroying a network or system.
Occupational Overuse Syndrome Also known as Cumulative Trauma Disorder.
Online Banking A system allowing individuals to perform banking activities via the Internet.
Online Bidding Users try to outbid each other by offering higher prices to makea purchase over the Internet.
Online Disinhibition An effect where people behave on the Internet with less restraints than in the real-world.
Online Financial Transactions Transferring money over the Internet.
Online Gaming Addiction Extreme online gaming which could result in social awkwardness and less sensitivity towards others.
Online Predator An adult Internet user who exploits children or teens for sexual or other abusive purpose.
Online Sales Fraud Tricking users into ordering and paying for items online. However, they will never receive a delivery.
Online Shopping Purchasing products or services through the Internet
Parameter A limit or boundary which defines the scope of a particular process or activity.
Password Sniffing Trying to ‘steal’ passwords by examining data traffic. These passwords will later be used to cover-up attacks.
PDAs A palmtop computer that functions as a personal organizer which also provides email and Internet access.
Peer-to-Peer A system of file swapping that lets its users exchange or share files over the Internet
Peripherals Devices that are attached to a computer such as printers and scanners.
Personal Identification Number A numerical code used in many electronics financial transaction.
Phishing Tricking users into disclosing personal data such as credit card information and social security numbers with intentions of misusing them. This is commonly done through e-mails, which will prompt users to verify or update their account information by clicking on the link provided.
Phreaker An individual who hacks telephone systems to make free phone calls.
Piracy The act of illegally making copies of copyright-protected materials such as software, music or movies.
Plagiarism The practice of taking someone else’s work or ideas and claiming them as your own.
Pornography Nude or sexual content which are inappropriate and considered immoral by most religions and cultures.
Privilege A special right or advantage granted or available only to a particular person or group.
Public Domain Any type of work that is not currently protected by a copyright.
Repetitive Strain Injuries Also known as Cumulative Trauma Disorder.
Security Breach An act from outside an organization that bypasses or violates security policies, practices, or procedures.
Sleep Disorder A medical condition relating to the sleep patterns of a person.
Sniffer A program that is designed with the ability to intercept information across a computer network.
Social Networking Sites Any website that enables users to create public profiles and form relationships with other members within that site.
Spamming Sending unwanted messages via e-mail to many users at the same time with the intention to deceive or advertise questionable products or services
Synchronously Existing or occurring at the same time.
Trojan/ Trojan Horse A computer program disguised as useful software that actually infects your system instead.
Unauthorized Access A situation where a person accesses a system without legal permission.
URL Uniform Resource Locator Global address of documents and other resources on the World Wide Web.
Virus A piece of program code that makes copies of itself by attaching itself to another program. It can waste the host’s resources, and sometimes destroy or change files.
Visual Impairments Any kind of vision loss, whether it’s someone who cannot see at all or someone who has partial vision loss.
Web 2.0 Interactive web tools and services, allowing collaboration and the sharing of content online.

اليوم العالمي لإنترنت أكثر أمنا

اليوم العالمي لإنترنت أكثر أمنا هو اليوم الذي يحتفل به عندما يكون الأطفال والكبار يتعلمون من بعضهم بعضا ويجتمعون على الشبكات في وسائل التواصل الاجتماعية وأنظمتها. اقرأ المزيد

انها حياتك وبإمكانك التحكم بها

ما تفعله على الإنترنت يؤثر على عالمك الخاص بأسره،إنها حياتك وأنت المتحكم بها، تعرف كيف يمكنك حماية نفسك. اقرأ المزيد

الشركاء التعليميون

دخول إلى نظام التعليم الإلكتروني
Knews cant update. Please, check user database permisions. (You must allow ALTER TABLE). (ver. 1.0.5) Table 'uae1215601361509.wp_knewsautomated' doesn't exist sql: ALTER TABLE wp_knewsautomated ADD COLUMN submit_time varchar(5) NOT NULL DEFAULT '00:00'