| A | B |
| Back Up | to make a duplicate copy of a program, a disk, or data |
| Computer Privacy | keeping a user’s data inaccessible by anyone without appropriate permission |
| Computer Security | the protection of a computer system and its data from accidental or intentional loss and tampering |
| Computer Threat | any factor that can damage your computer or the data on it |
| Firewall | a filter that blocks unreliable information from the Internet before it reaches your computer or a private network. |
| Hacker | a person who uses computer expertise to gain unauthorized access to a computer in order to misuse data stored on the computer |
| Identity theft | the fraudulent acquisition and use of a person's private identifying information, usually for financial gain |
| Online Predator | an individual who develops contact with Internet users to exploit them financially or involve them in dangerous relationships |
| Power surge | a sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers |
| Software Piracy | unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner |
| Spyware | a computer program that is installed on your computer without your knowledge and secretly tracks your Web browsing habits |
| Trojan Horse | a destructive computer program disguised as a game, utility, or software |
| Virus | a computer program that is designed to cause malfunctioning of a computer or damage the data stored on the computer |
| Worm | a computer program that propagates itself across computers, usually by creating copies of itself in each computer's memory |