| A | B |
| Refers to careers in Science, Technology, engineering, and mathematics. | STEM |
| The process of designing, writing, testing, debugging, and maintaining the source code of computer programs. | Programming |
| Computer software designed to harm a computer. | Malware |
| Characterized by a dependence on the use of digital technologies such as cellphones and computers. | Digital Addiction |
| Using technology to harm others through deliberate, repeated, and hostile attack. | Cyberbullying |
| One present but not taking part in a situation or event. | Bystander |
| Combines different content forms such as text, audio, animation and still images. | Multimedia |
| Representing the language or thoughts of an author as your own, without indicating where the information is from. | Plagiarism |
| Property created from an original thought or idea. | Intellectual Property |
| A limitation and exception to the exclusive right granted by law to the author of a creative work. | Fair Use |
| Exclusive rights given to someone who creates original work. The individual is protected for his/her lifetime and 50 years after his/her own death. | Copyright |
| A personal and sometimes unreasonable judgment or prejudice. | Bias |
| A video camera for computers, typically used to provide real-time video footage. | Webcam |
| A type of malware that replicates itself and spreads to other computers. | Virus |
| An object or pattern that is quickly replicated and shared. | Viral |
| A website designed for groups of people who publish their own information and share it with others. | Social Network |
| Media that use the Internet and cell phone applications to interact, collaborate and create content. | Social Media |
| The unauthorized reproduction or copying of music, video or literature and usually without proper compensation or permission. | Piracy |
| A form of fraud where one person assumes the identity of another person. | Identity Theft |
| When one's computer or computer network has been broken into, or accessed without one's permission. | Hacked |
| Receiving data, such as music or video file, from a server or another computer system. | Downloading |
| A computer software that displays advertisements. | Adware |
| Abbreviations and slang commonly used to shorten a text or instant message. | Textspeak |
| A device that is designed to perform various computer applications including, but not limited to e-mail, browsing the web, playing video games, playing music and watching videos. | smartphone |
| The act of sending inappropriate sexual material, usually text or image, between cell phones. | Sexting |
| The use of letters and punctuations in a message that indicates the emotion of the text. | Emoticon |
| Electronic mail sent between computer network. | E-mail |
| A computer program used to display information, normally in the form of a slide show. | Presentation |
| A computer application that simulates a paper accounting worksheet. | Spreadsheet |
| A computer application used for the production of any sort of printable material. | Word Processing |
| A highly portable computer shaped like slate or pad of paper, featuring a touch screen. | Tablet |
| A computer system that stores enormous amounts of data. | Database |
| A computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer. | Cloud Computing |
| Also called an "app," it is computer software created for a particular a particular task. It is increasingly used to mean software that is downloaded for use on a cell phones or mobile devices. | Application |