| A | B |
| Netiquette | Network etiquette. |
| Piracy | The illegal copying of software. |
| Virus | A program designed to reproduce itself by copying itself into other programs stored on a computer without the user's knowledge. |
| Computer Ethics | "Applied professional ethics dealing with ethical problems aggravated |
| ACM | Association for Computing Machinery |
| Information Age | Due to the computer's ability to store and manipulate large amounts of information. |
| Online profiling | Marketing technique where data is collected about customers visiting a website. |
| Cookie | A text file created by the server computer when a user enters information into a website. |
| Web Beacons | Tiny |
| Privacy Policy | Legally binding document that explains how any personal information will be used. |
| Ergonomics | The science that studies safe work environments. |
| Acceptable Use Policy | Document that outlines appropripate use for computers |
| Copyright | Protection of digital information. |
| Worm | Virus program that is able to reproduce itself over a network. |
| Trojah Horse | Virus program that appears as something else. |
| Antivirus programs | Install on computers to detect and remove code before it can be replicated or damage data. |
| Hacking | Illegally gaining access to large computer systems to perform acts of vandalism. |
| Phishing | Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft. |