Digital Glossary

Learn digital and tech terms explained in simple, easy-to-understand language

A B C D E F P S V All
Security & Privacy
Password
A secret combination of characters (letters, numbers, symbols) that protects your online accounts. Only you should know your password.
Example: Your email password keeps others from accessing your private messages and accounts.
Two-Factor Authentication (2FA)
An extra security layer that requires two forms of verification to log into an account. Usually your password plus a code sent to your phone.
Example: Logging into your bank account requires both your password and a code texted to your phone.
Phishing
A scam where criminals trick you into giving away personal information by pretending to be a legitimate company through fake emails or websites.
Example: A fake email "from your bank" asking you to click a link and verify your account details.
Encryption
Converting information into a secret code so only authorized people can read it. Keeps your data safe while traveling online.
Example: Your bank uses encryption to protect your account number and balance from hackers.
Privacy Settings
Controls that let you decide who can see your information, posts, and activity on social media or other platforms.
Example: Changing your Instagram privacy settings to "Private" so only approved followers can see your posts.
Scams & Fraud
Scam
A dishonest scheme designed to trick people into giving away money, personal information, or passwords.
Example: A call claiming you've won a prize, but you need to pay a fee to claim it—the prize doesn't exist.
Malware
Malicious software designed to damage, disable, or gain unauthorized access to your device or data.
Example: Clicking on a suspicious link that installs software that steals your passwords.
Catfishing
When someone creates a fake online identity to trick or deceive another person, often for romance or money.
Example: Someone claiming to be a model online but asking for money for "travel costs" to meet you.
Social Media
Algorithm
A set of instructions that computer programs follow. Social media algorithms decide which posts you see based on your activity.
Example: Instagram's algorithm shows you more posts from accounts you interact with frequently.
Misinformation
False or inaccurate information spread online, whether intentionally or unintentionally.
Example: A viral post claiming a fake cure for a disease that isn't proven to work.
Disinformation
False information deliberately created and spread to deceive people or manipulate opinions.
Example: A fake news article created specifically to influence an election.
Deepfake
Manipulated video or audio created using artificial intelligence to make someone appear to say or do something they didn't.
Example: A fake video of a politician saying something they never actually said.
Viral
Content that spreads rapidly across social media and the internet through sharing.
Example: A funny video shared so many times that millions of people see it within days.
Communication
Cyberbullying
Harassment or bullying that happens online through messages, comments, or social media.
Example: Sending mean messages to someone or posting hurtful comments on their photos.
Digital Footprint
The trail of information you leave behind online—posts, likes, comments, photos, and data collected about you.
Example: Everything you post on social media creates a permanent digital footprint.
Technical Terms
Browser
An application used to access and view websites on the internet. Examples: Chrome, Safari, Firefox, Edge.
Example: You open Chrome (a browser) to visit Google.
Cache
Temporary storage of data on your device to help websites load faster when you revisit them.
Example: Clearing your browser cache removes stored website data and can free up space.
Cookies
Small files websites store on your device to remember information about you, like login details or preferences.
Example: A website remembers your language preference because it stored that in a cookie.
VPN (Virtual Private Network)
A tool that encrypts your internet connection and hides your location, making your online activity more private and secure.
Example: Using a VPN when on public WiFi to prevent hackers from seeing your passwords.
Screenshot
A digital image of whatever is displayed on your device's screen at that moment.
Example: Taking a screenshot of a funny text conversation to share with friends.