| A | B |
| This computer crime threatens to damage a computer or computer system in order to receive money | Extortion |
| A computer program that detects viruses and repair files | Antivirus Program |
| Software that is not copyrighted and is free to copy and distribute | Public Domain |
| A person who secretly gains access to computers and files without permission | Hacker |
| A program intended to scare users into thinking they have a virus | Hoax |
| A safeguard for access to a computer or computer program | Password |
| This computer related crime uses computers, computer systems, or computer networks for the prupose of falsifying educational scores | Accessing Computers |
| A destructive computer code or virus designed to activate at a specific time | Bomb |
| A set of moral principles or values | Ethics |
| Software that is given away free of charge, but whose author still retains all rights | Freeware |
| This computer related crime relates to destroying computers, computer systems or computer's network | Damaging Computers |
| Copyrigted software distributed free of charge on a trial basis with payment by the honor system | Shareware |
| A destructive computer program that bores its way through a computer's files or through a computer network | Worm |
| A computer program designed to cause damage to computer files | Virus |
| A virus that disguised as a useful piece of software | Trojan Horse |
| Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work | Copyright |
| Software whose copyright is owned by the author/software publisher | Commercial Software |
| The computer crime prevent an authorized computer user form accessing his or her computer | Denial of computer services to an authorized user |
| The illegal copying and distribution of software | Piracy |
| A place to store a file. Also known as a directory or subdirectory | Folder |