| A | B |
| Copyrighted | Software can be copied for backup purposes only. |
| Public Domain | Software can be feely copied and is distributed free to everyone. |
| Shareware | Software distributed on a trial basis and you are expected to pay a small fee in order to keep it. |
| Worm | Programs designed to enter a computer network, spread and reproduce. |
| Trojan horse | Programs disguised to perform a useful function but instead can cause damage and infiltrate a network. |
| Virus | Software that is created to intentionally destroy data. |
| Encryption | Technology that scrambles information so that only the sender and receiver can read it. |
| Bomb | Type of virus that activates on a particular date. |
| Passwords | Personal security codes which allow you to access online accounts. |
| Privacy Rights | Vary tremendously depending on the identiy of the intruder. |
| Backup | A separate copy of your work. |
| fair use | right for schools and teachers to use copyrighted works without permission |
| antivirus program | computer program that detects viruses and repairs files |
| commerical software | software whose copyright is owned by author/software publisher |
| ethics | moral guidelines that govern use of computers and internet |
| netiquette | proper online use and behavior |
| freeware | software that is free, but author stills retains all rights |
| hoax | program intended to scare users into thinking they have a virus |
| piracy | illegall copying and distribution of software |
| phage | virus that modifies other programs |