| A | B |
| Ethics | Standards of honesty, morality, and fairness as related to using computers |
| Intellectual Property | Products someone creates based on his or her thoughts or ideas (Ex: music, software, computer games) |
| Copyright Laws | Established in 1978 to protect software companies and creators from illegal use of their products |
| Software Piracy | Unathorized use or duplication of a software program (Ex: copying your friend's computer games) |
| Freeware/Shareware | Software that can be sampled and copied freely |
| Hacking | Unathorized use of computer systems; breaking into someone's computer system; using passwords without permission |
| Computer Virus | Software program that destroys information or makes it difficult to use the contents of your computer by changing other programs to include a copy of itself; it is a parasite program because it needs another program to survive |
| Sabotage | A deliberate act that causes damage or destruction of computer hardware or software (Ex: virus) |
| Computer Vandalism | Act of damaging, altering, or destroying a computer or the setup or the software |
| Public Data | Information that carries your permission for public use (Ex: phone numbers, names, addresses, e-mail address) |
| Private Data | Information that is not given out to the public (Ex: passwords, social security #'s, credit card #'s) |
| Privacy of Information | Individuals have a right to expect that organizations will keep personal info confidential; The Privacy Act of 1974 was created to protect individuals |
| Fair Use and Multimedia Guidelines | Provide educators with the right to make reasonable copies of copyrighted material without specific consent of the author for use in teaching |