| A | B |
| adware | Software that delivers advertising without the user’s knowledge or consent. |
| cyber predator | person who uses the Internet to make contact with others (usually with children and teens) in order to harm them. |
| digital media | Any combination of audio, video, images, and text used to convey a message through technology. |
| encryption | Converting text into an unreadable series of numbers and letters to protect information. Digital encryption uses software that can scramble and unscramble the data. |
| ergonomics | science that studies the best way to design a workplace for maximum safety and productivity. |
| hacker | A person who finds an electronic means of gaining unauthorized access to a computer. |
| keylogger | Software that tracks keyboard use and transmits it to be used for illegal purposes. |
| malware | The abbreviation for malicious software, designed to damage a computer or steal information. |
| naming convention | A set of rules used in the naming of files and folders. |
| online backup | A means of backing up or storing data using the Internet. |
| phishing | A social engineering activity where the perpetrator uses fake websites or emails to trick a user into providing personal information or passwords. |
| repetitive stress injury | muscle or joint injury that results from performing actions repeatedly. |
| rootkit | Software designed to keep a computer user from knowing the computer system has been infected by malware. |
| server | A computer designed to store files from multiple computers. |
| social engineering | Tricking users into providing information in the belief that a request is legitimate. |
| spyware | Malware that captures information from a computer without the user’s knowledge or consent. |
| Trojan horse | Software that appears to be useful but instead allows access to a computer without the user’s knowledge or consent. |
| virus | A program that infects a computer without the permission or knowledge of the owner. |
| worm | A form of a virus that does not require any action by the computer user. |