| A | B |
| Computer Fraud | Conduct that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property or value, or to cause loss. |
| Computer Crimes | A criminal act that is committed through the use of a computer, like getting into someone else’s system and changing information or creating a computer virus and causing it to damage information on others’ computers. |
| Hacker's | Involves invading someone else’s computer, usually for personal gain or just the satisfaction of being able to invade someone else’s computer. |
| Logic Bombs | Computer virus which is triggered by the appearance or disappearance of specified data. |
| Shareware | Software you can use for free for a specified period to try it out. If you decide that you like it and it meets your needs, you are suppose to pay for it. |
| Time Bomb | Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. |
| Trojan Horse | Computer virus that does something different from what it is expected to do. It may look like it is doing one thing while in actuality it is doing something quite opposite (usually something disastrous). |
| Worm | A type of computer virus that makes many copies of itself resulting in the consumption of system resources which slows down or actually halt tasks. |