Search Content

Business Word/Phrase of the Day

word-phrase-descEvery day we publish a business word or phrase together with audio pronunciation, phonetics, definition and example sentences. This is a great way to improve your workplace vocabulary as well as your pronunciation. To receive 'Business Word/Phrase of the Day' by email, just subscribe to our newsletter from the link above. 

SPYWARE /ˈspaɪ.weər/

25 Jun 2013

noun

  • a computer program that watches what people do with their computers, and then sends that information over the Internet
Example Sentences:If you believe your computer is infected, you should also carry out a full anti-virus scan and run two or three malware and spyware cleaners, such as AdAware, Spybot and Malwarebytes.
There is an email going around containing spyware which searches for passwords on your computer and send the information out to the spyware creators.
 

ADWARE /ˈædˌwɛə/

23 Jun 2013

noun

  • Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.
Example Sentences:Adware can clog up your computer and make it run more slowly.
Adware and spyware is a multi-billion dollar business.
 

POP-UP BLOCKER  

21 Jun 2013

phrase

  • a program that helps to prevent unwanted windows from appearing on your screen
Example Sentences:Windows 7 includes a built-in pop-up blocker as part of its security features.
 

POP-UP /ˈpɒp.ʌp/

19 Jun 2013

noun

  • a new unwanted window that opens quickly on a computer screen in front of what you are working on
Example Sentences:Be careful of that site. It has lots of pop-ups.
Pop-ups often contain advertisements.
 

TO CRASH /kræʃ/

17 Jun 2013

verb

  • (of a computer system) fail suddenly
Example Sentences:A computer virus caused my computer to crash.
I took my laptop to a computer repair shop after it crashed and I was unable to start it again.
 

MALWARE /ˈmæl.weər/

15 Jun 2013

noun

  • A generic term increasingly being used to describe any form of malicious software such as viruses, trojan horses, malicious code, etc.
Example Sentences:Those with infected machines will be encouraged to download free security software to remove the malware.
 

TROJAN HORSE /ˌtrəʊ.dʒənˈhɔːs/

13 Jun 2013

phrase

  • A trojan horse is a computer program that appears to perform a useful and innocent function. However, it contains hidden functions that use approved authorizations assigned to the user when they start the program. For example, it may copy your internal authorization information from your computer and send it back to the originator of the trojan horse.
Example Sentences:My computer is infected with a trojan horse. Can anyone tell me how I can get rid of it?
You must have picked up a trojan horse from that email attachment you opened this morning.
 

FIREWALL /ˈfaɪə.wɔːl/

11 Jun 2013

noun

  • a device or program that stops people getting access to a computer without permission while it is connected to the Internet
Example Sentences:If you are running a Windows operating system, make sure your Windows firewall is switched on.
The data on your PC is not secure if your firewall is switched off.
 

DIGITAL SIGNATURE  

09 Jun 2013

phrase

  • A digital signature on an electronic document is equivalent to a personal signature on a written document. A digital signature provides proof of the document's origin. The certificate owner "signs" a document by using the private key that is associated with the certificate. The recipient of the document uses the corresponding public key to decrypt the signature, which verifies the sender as the source.
Example Sentences:He used a scanned copy of his signature instead of a digital one.
The entire transaction is recorded and secured using digital signature technology
 

ENCRYPTION /ɪnˈkrip.ʃən/

07 Jun 2013

noun

  • the process of translating data into a secret code for protection purposes
Example Sentences:Your financial information is fully encrypted and cannot be accessed.
This file is encrypted. You will need a password to open it.
 

SECURE COMMUNICATION  

05 Jun 2013

phrase

  • When two entities are communicating with each other, and they do not want a third party to listen to their communication, then they want to pass on their message in such a way that nobody else could understand their message.
Example Sentences:I have two computers and use one only for secure communication, like online banking, and another one for anything else.
Websites which include personal details such as names and email addresses should use secure communication.
 

AUTHORIZATION /ˌɔː.θər.aɪˈzeɪ.ʃən/

03 Jun 2013

noun

  • the concept of allowing access to internet resources only to those permitted to use them
Example Sentences:Sorry, but you are not authorized to enter the forum. Please register as a new user.
Only myself and John are authorized to make changes to the website.
 

AUTHENTICATION /ˈəʊ.və.taɪm/

01 Jun 2013

noun

  • this is a technique that limits access to Internet or intranet resources to visitors who identify themselves by entering a user name and password
Example Sentences:Authentication of user email addresses is essential to prevent owners of email addresses from receiving spam.
After registering, please click on the link in the email from us to authenticate your email address.
 

TO INFECT /ɪnˈfekt/

30 May 2013

verb

  • to pass harmful programs from one computer to another, or within files in the same computer
Example Sentences:The computer network is down. It’s been infected by a virus.
A computer virus may lurk unseen in a computer's memory, calling up and infecting each of the machine's data files in turn.
 

WORM /wɝːm/

28 May 2013

noun

  • Similar to a virus, this is a harmful computer program that self-replicates. Worms replicate by making copies of themselves. Typically, worms do not require a person to run them; they replicate automatically.
Example Sentences:What is the difference between a virus and a worm?
Many worms that have been created are only designed to spread, and don't attempt to alter the systems they pass through.
 
Menu