| A | B |
| Netiquette | The manners people use in electronic communications |
| Flaming | Using obscene or angry language |
| Shouting in Emails | Typing in all capital letters |
| DOS Attacks (Denial of Service) | When someone uses various computer tricks to overload and eventually shut down a company’s Web site |
| Crackers | Someone who steals information or breaks down software’s security protections to destroy computer systems |
| Hackers | Someone who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage |
| Digital Pirates | The unauthorized manufacturing and selling of works that are copyrighted |
| Viruses | A program intentionally designed to cause annoyance or damage to computer hardware or software |
| Worm Virus | A virus that looks like a program which uses a computer to host and reproduce the virus, which then travels over the computer network to infect all workstations it can |
| Trojan Horse Virus | A virus that looks like a program which performs a useful task while at the same time carrying out some secret destructive act of sabotage |
| Time Bomb Virus | A type of Trojan horse virus that watches the clock and is activated on a certain date or certain time of the day |
| Computer Virus | Software that spreads a problem from program to program or from disk to disk, and uses cache infected programs or disks to make more copies to itself |
| Logic Bomb Virus | A program designed to attack in response to a particular logical event or sequence of events |
| File Virus | A virus that attaches to an application program |
| Boot sector Virus | A virus that infects the system files that your computer uses every time it is turned on |
| Macro Virus | A virus that is transmitted through macros embedded in documents and usually spread via email |
| Malware | A type of software, script of code designed to disrupt a computers operation by gathering sensitive information, or gaining unauthorized access to the computer systems |
| Spyware | A type of software that self-installs on a computer, enabling information to be gathered about a person's Internet use, passwords, etc. |
| Antivirus Software | A type of software used to prevent, detect, and remove malware or a harmful viruses like: worms, trojan horses, etc. |
| Attachments | A way to send files, pictures, documents, etc. via email that can be susceptible to having a virus |
| Firewall | A software program that acts as a barrier between a computer and the internet to protect the computer from unauthorized access |
| Ethics | The principles and standards we use to decide how to act |
| Rules | Specific guidelines about appropriate use of computers |
| AUP (Acceptable Use Policy) | The rules for safe and proper use of the computer at your school |
| Laws | Regulations passed by state and federal bodies that protect against some forms of misuse of computers and information resources |
| Privacy Laws | Online privacy – describes how your personal data might be used, whether it might be sold or distributed, and how it might be protected from unauthorized access |
| Intellectual Property | Intangible property that is created by someone’s creativity and intellectual effort |
| Copyright | The legal protection for intellectual property |
| Trademark | A name, symbol or something that stands for something else, or other features that identifies a product with a specific owner |
| Permission | Asking an owner or creator of a work if you can use their work in a way that it was not intended for |
| Faire Use | Times when you may use a copy of a copyrighted work without asking for permission |
| Public Domain Software | This software has no owner and is not protected by copyright law |
| Freeware Software | This is a copyrighted software that is licensed to be copied and distributed without charge |
| Shareware Software | This software is licensed for copying and sharing for a trial period, but payment must be made to the owner for permanent use |
| Open Source Software | This software may be sold or distributed free of charge in complied form, but it must, in every case, also include the source code |
| All Rights Reserved Software | This software may be used by the purchaser according the exact details spelled out in the license agreement |