| A | B |
| Internet | This is a worldwide, publicly accessible network of interconnected computer networks |
| Intranet | This is a private computer network that uses Internet protocols with its employees. |
| Cookie | This is parcels of text sent by a server to a web browser and then sent back unchanged by the browser each time it accesses that server. |
| Trojan Horse | This is a program that unlike a virus contains or installs a malicious program |
| Worm | This is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. |
| Hacker | This is a software designer and programmer who builds programs and systems that garner the respect of one's peers |
| Prey | A person that is helpless or unable to resist attack while online. |
| Predator | A person that preys on some other person on line. |
| e-mail | This is a method of composing, sending, storing, and receiving messages over electronic communication systems. |
| e-mail signature | This is a block of text appended to the end of an email message often containing the sender's name, address, phone number, or other contact information. |