Table:
In computer programming, a table is a data structure used to organize information, just as it is on paper.

Tabbed Browsing:
Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.

Tap:
On a handheld device, a tap is the equivalent of a mouse click on a personal computer, used to select options and to interact with programs.

targeted attack:

A targeted attack is one that seeks to breach the security measures of a specific individual or organization. Usually the initial attack, conducted to gain access to a computer or network, is followed by a further exploit designed to cause harm or, more frequently, steal data.

Task:
In computer programming, a task is a basic unit of programming that an operating systemcontrols.

Taskbar:In the graphical user interface (GUI) for a computer operating system or application, a taskbar is a visual device on the desktop that typically shows the user which applications (tasks) are currently active and running.
TCP/IP- Stands for "Transmission Control Protocol/Internet Protocol." These two protocols were developed in the early days of the Internet by the U.S. military. The purpose was to allow computers to communicate over long distance networks.
tebibyte:is a unit of data storage that equals 2 to the 40th power, or 1,099,511,627,776 bytes.
Terabyte:
A terabyte is 1012 or 1,000,000,000,000 bytes.
One terabyte (abbreviated "TB") is equal to 1,000gigabytes and precedes the petabyte unit of measurement. While a terabyte is exactly 1 trillion bytes, in some cases terabytes and tebibytes are used synonymously, though a tebibyte actually contains 1,099,511,627,776 bytes (1,024 gibibytes).
Title Bar: A title bar is the section at the top of a window that contains the name or description of the window
Trojan Horse: In the computing world, Trojan horses are more than just a myth. They really exist and can cause damage to your computer. Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.
Traceroute:
When computers communicate over the Internet, there are often many connections made along the way. This is because the Internet is made up of a network of networks, and two different computers may be on two separate networks in different parts of the world. Therefore, if a computer is to communicate with another system on the Internet, it must send data through a series of small networks, eventually getting to the Internet backbone, and then again traveling to a smaller network where the destination computer resides.

Troll:the term "troll" refers to a person who posts offensive, incendiary, or off topic comments online.

Twitter ; is an online service that allows you to share updates with other users by answering one simple question:

What are you doing?