| A | B |
| Acceptable Use Policy | A set of rules that and guidelines that are set up to regulate Internet use and protect the user. |
| Trojan Horse | A virus that is disguised as a useful piece of software. |
| Computer Ethics | Using computer technology for good purposes. |
| Hacker | A person who secretly gains access to computers and files without permission. |
| Worm | A destructive computer program that bores or works its way through a computer file or through a computer network causing damage. |
| Virus | A computer program designed to cause damage to computer files. |
| Antivirus Program | A computer program that detects viruses and repairs files. |
| Ethics | A set of morale principles or values. |
| Bomb | A virus that is designed to activate at a specific time. |
| Hoax | A program that scares you into thinking that you have a virus. |
| Password | A safeguard for access to a computer or computer program. |
| Piracy | The illegal copying and distribution of software. |