| A | B |
| personal information | information about you that does not identify who you are |
| private information | information that CAN be used to identify |
| malware | software created to damage your files, your computer or steal your identity |
| spam | commercial messages that you didn't ask for |
| phishing | spammers who want to steal private information and send messages or links that look real |
| anonymous | not giving any information about your identity |
| social networking | using a website to connect with people who share interests |
| firewall | a way to prevent outsiders from getting into a computer network |
| anitvirus software | software used to prevent, detect and remove malware |
| spyware | malware that looks for private information on your computer |
| virus | malware that spreads to many computers |