Search Content

Business Word/Phrase of the Day

word-phrase-descEvery day we publish a business word or phrase together with audio pronunciation, phonetics, definition and example sentences. This is a great way to improve your workplace vocabulary as well as your pronunciation. To receive 'Business Word/Phrase of the Day' by email, just subscribe to our newsletter from the link above. 

ADWARE /ˈædˌwɛə/

23 Jun 2013


  • Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.
Example Sentences:Adware can clog up your computer and make it run more slowly.
Adware and spyware is a multi-billion dollar business.


21 Jun 2013


  • a program that helps to prevent unwanted windows from appearing on your screen
Example Sentences:Windows 7 includes a built-in pop-up blocker as part of its security features.

POP-UP /ˈpɒp.ʌp/

19 Jun 2013


  • a new unwanted window that opens quickly on a computer screen in front of what you are working on
Example Sentences:Be careful of that site. It has lots of pop-ups.
Pop-ups often contain advertisements.

TO CRASH /kræʃ/

17 Jun 2013


  • (of a computer system) fail suddenly
Example Sentences:A computer virus caused my computer to crash.
I took my laptop to a computer repair shop after it crashed and I was unable to start it again.

MALWARE /ˈmæl.weər/

15 Jun 2013


  • A generic term increasingly being used to describe any form of malicious software such as viruses, trojan horses, malicious code, etc.
Example Sentences:Those with infected machines will be encouraged to download free security software to remove the malware.

TROJAN HORSE /ˌtrəʊ.dʒənˈhɔːs/

13 Jun 2013


  • A trojan horse is a computer program that appears to perform a useful and innocent function. However, it contains hidden functions that use approved authorizations assigned to the user when they start the program. For example, it may copy your internal authorization information from your computer and send it back to the originator of the trojan horse.
Example Sentences:My computer is infected with a trojan horse. Can anyone tell me how I can get rid of it?
You must have picked up a trojan horse from that email attachment you opened this morning.

FIREWALL /ˈfaɪə.wɔːl/

11 Jun 2013


  • a device or program that stops people getting access to a computer without permission while it is connected to the Internet
Example Sentences:If you are running a Windows operating system, make sure your Windows firewall is switched on.
The data on your PC is not secure if your firewall is switched off.


09 Jun 2013


  • A digital signature on an electronic document is equivalent to a personal signature on a written document. A digital signature provides proof of the document's origin. The certificate owner "signs" a document by using the private key that is associated with the certificate. The recipient of the document uses the corresponding public key to decrypt the signature, which verifies the sender as the source.
Example Sentences:He used a scanned copy of his signature instead of a digital one.
The entire transaction is recorded and secured using digital signature technology

ENCRYPTION /ɪnˈkrip.ʃən/

07 Jun 2013


  • the process of translating data into a secret code for protection purposes
Example Sentences:Your financial information is fully encrypted and cannot be accessed.
This file is encrypted. You will need a password to open it.


05 Jun 2013


  • When two entities are communicating with each other, and they do not want a third party to listen to their communication, then they want to pass on their message in such a way that nobody else could understand their message.
Example Sentences:I have two computers and use one only for secure communication, like online banking, and another one for anything else.
Websites which include personal details such as names and email addresses should use secure communication.

AUTHORIZATION /ˌɔː.θər.aɪˈzeɪ.ʃən/

03 Jun 2013


  • the concept of allowing access to internet resources only to those permitted to use them
Example Sentences:Sorry, but you are not authorized to enter the forum. Please register as a new user.
Only myself and John are authorized to make changes to the website.

AUTHENTICATION /ˈəʊ.və.taɪm/

01 Jun 2013


  • this is a technique that limits access to Internet or intranet resources to visitors who identify themselves by entering a user name and password
Example Sentences:Authentication of user email addresses is essential to prevent owners of email addresses from receiving spam.
After registering, please click on the link in the email from us to authenticate your email address.

TO INFECT /ɪnˈfekt/

30 May 2013


  • to pass harmful programs from one computer to another, or within files in the same computer
Example Sentences:The computer network is down. It’s been infected by a virus.
A computer virus may lurk unseen in a computer's memory, calling up and infecting each of the machine's data files in turn.

WORM /wɝːm/

28 May 2013


  • Similar to a virus, this is a harmful computer program that self-replicates. Worms replicate by making copies of themselves. Typically, worms do not require a person to run them; they replicate automatically.
Example Sentences:What is the difference between a virus and a worm?
Many worms that have been created are only designed to spread, and don't attempt to alter the systems they pass through.

MALICIOUS CODE ˌ/məˈlɪʃ.əs koʊd/

26 May 2013


  • computer software capable of performing an unauthorized process on an information system, usually with the intent of causing damage
Example Sentences:Is this a trusted website? It might contain some malicious code.
If you visit a website containing malicious code, it could seriously damage your computer.