| A | B |
| Backup | Procedures that place a priority on files that would be difficult or impossible to replace or reconstruct |
| Data Theft | Removing data from a computer without authorization |
| Driver | A small program that instructs the operating system on how to operate specific hardware |
| Encrypton | A standard method for encoding data |
| Humidity | Moisture in the air that can cause computers to short circuit, resulting in the loss of data and damage to hardware |
| Ping | A DOS command that tests connectivity and isolates hardware problems and any mismatched configurations |
| Power Spikes | A short fast transfer of electrical voltage, current, or energy |
| Surge Suppressor | Devices that protect against power spikes |
| Uninterruptible Power Supply | A battery power source that provides electric current during a power outage. |