| A | B |
| Black hat | Bad hacker who creates malicious programs to break into computers |
| Carpal Tunnel Syndrome | Common repetitive motion disorder that effects the nerves of the |
| Ergonomics | Use of scientific information about the human body to design |
| Eye strain | Problems caused when computer users stare at a computer |
| Firewall | Hardware device or program that prevents unwanted access |
| Overloaded outlet | Situation where too many things are plugged into an outlet; creates |
| Phishing | E-mail attack or scam designed to gather information from a user |
| Repetitive motion disorder | Muscular disorders that come from repeated motions like typing |
| Spoofing | When someone presents themselves as someone else in order to |
| Spyware | Malicious program installed without the user’s knowledge while |
| Strong password | Password with at least eight characters containing a mixture of |
| Virus | Program specifically written to cause harm to your data and |
| Weak password | Password that contains anything that could be easy to guess, |
| Worm | Malicious program that travels from computer to computer, |