| A | B |
| Antivirus Program | A computer program that detects viruses and repairs files. |
| Bomb | A destructive computer code or virus designed to activate at specific time. |
| Commercial Software | Software whose copyright is owned by the author/software publisher. |
| Copyright | Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work. |
| Encryption | Process of converting readable data into unreadable characters to prevent unauthorized access. |
| Ethics | The moral guidelilnes that govern the use of computers and information systems. |
| Freeware | Software that is given away free or charge, but whose author still remains all rights. |
| Hacker | A person who secretly gains access to computers and files without permission. |
| Hoax | A program inteded to scare users into thinking they have a virus. |
| Password | A safeguard for access to a computer or compter program. |
| Phage | A program that modifies other programs, operating systems, and databases. |
| Piracy | The illegal copying and distribution of software. |
| Public Domain Software | Software that is not copyrighted and is free to copy and distribute. |
| Shareware | Copyrighted software distributed free of charge on a rtrial basis with payment by the honor system. |
| Trojan Horse | A virus that is desguised as a useful piece of software. |
| Virus | A computer progralm designed to cause damage to computer files. |
| Worm | A destructive computer program that bores its way through a computer's files or through a computer's network. |