| A | B |
| Backup | Procedures that place a priority on files that would be difficult if they were lost, as a company's financial statements, important projects, and works in progress. |
| Data theft | Removing data from a computer without authorization. |
| Driver | A small program that instructs the operation system on how to operate specific hardware. |
| Encryption | A standard method for encoding data. |
| Humidity | Moisture in the air that can cause computers to short circuit, resulting in the loss of data and damage to hardware. |
| Ping | A DOS command that tests connectivity and isolates hardware problems and any mismatched configuration. |
| Power Spikes | A short, fast transfer of electrical voltage, current, or evergy. |
| Surge suppressors | Devices that protect against power spikes |
| Uninterruptible power supply (UPS) | A battery power source that provides electric current during a power outage. |