| A | B |
| Peripheral | Any device that can be attached (added on) to a computer |
| Copyright | The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work. |
| Phishing | The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft |
| Firewall | Designed to protect against Network Intrusion |
| A random mix of letters and numbers | The safest way to create a password |
| Worm virus | A destructive program that replicates itself over a computer network. |
| Trojan Horse virus | A destructive program that masquerades as something it is not. |
| SPAM | Electronic junk mail or junk newsgroup postings. |
| .jpeg | file extension is for a picture file |
| .wav | file extension for an audio file |
| LAN | A group of computers, connected by cables, set up to communicate with one another. Local Area Network |
| Random Access Memory | Temporary |
| CPU | The "brains" of the computer |
| IPOS cycle | Input, Processing, Output and Storage |
| Public Domain | Software that is given away without a charge |
| Hacker | A person who secretly gains access to your computer or files without your permission |
| a site license | Allows you to legally install software on multiple computers in your school or building |
| 10 percent or 3 minutes | the amount of copyrighted motion media can you use in a presentation |
| shareware | make a financial donation and register as an offical user |
| Computer crime | criminal act is committed through the use of a computer |
| Virus | A program that is written to cause corruption of data on a computer |