| A | B |
| Acceptable Use Policy | A set of rules and guidelines that are set up to regulate Internet use and to protect the user. |
| Antivirus Software | An application designed to search for viruses and repair files on a computer. |
| Bomb | A destructive computer virus that has a trigger to act based on a predetermined event or date. |
| Computer Vandalism | The intentional act of destroying computer files or computer networks. |
| Computer Virus | A computer program designed to damage computer files. |
| Computer/Cyber Crime | any criminal act dealing with computers and networks (called hacking). Additionally, it also includes traditional crimes conducted through the Internet. (Hate crimes; identify theft, Internet fraud, etc.) |
| Computer Ethics | The standards of honesty, morality, and fairness as related to computers. |
| Computer Fraud | Using the computer to deceive or trick someone for profit or to gain dishonest advantage. |
| Copyright Laws | The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work. Abbreviated as (c) or ©. |
| Fair Use Policy | A provision of the Copyright law that gives students and teachers the right to use copyrighted materials for educational purposes without asking the author for permission. They may also copy a small amount of work (being sure to give credit to the author) for reports or lessons. |
| Freeware | Software that is given away free of charge, but who's author still holds the copyright. |
| Hacking | The unauthorized use or access to a computer system or computer files. |
| Hoax | A program intended to scare users into thinking they have a computer virus. Carries the same punishment as actually sending a Computer Virus. |
| Intellectual Policy | Ideas put into actions, such as writings, music, art, or computer codes that are be protected under the copyright laws. |
| Malware | Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse. |
| Open Source/Public Doamain Software | Application software for which the underlying programming language is open for others to access. This allows the program to be changed by other programmers to meet other needs of the users. (This is the opposite of proprietary software.) |
| Password | A secret series of characters that enables a user to access a file, computer, or program and provides security and protection from others accessing your information. |
| Private Data | Information that is personal, such as your name, phone number, home address, e-mail address, social security #, credit card #’s, etc. This information needs to be protected because it can be exploited for business or even criminal intent. |
| Shareware | Software that can be tried before you purchase. |
| Proprietary Software | Application software for which the underlying programming language is protected by the software developer/owner so that others cannot modify it for other purposes. (This is the opposite of OPEN SOURCE software.) |
| Software License | A Legally binding agreement that states how one legally use the software they have purchased. |
| Software Piracy | The illegal copying and distribution of copyright protected software. |
| Spyware | Any software that secretly gathers information through the user's internet connection without the user's knoweldge, usually for advertising purposes. |
| Trojan Horse | A computer virus disguised as a useful piece of software. |
| Unethical | Not conforming to acceptable standards of conduct related to honesty, morality or fairness. |
| Worm | A computer virus that bores its way through a computer's file or network, reporducing itself and consuming the computer's resources and data. |