| A | B |
| shift | hold this key AND delete to completely erase email |
| replicate | trojan horses are unable to do this-unlike viruses or worms |
| reputable | games and software should only be downloaded from these companies |
| trojan horse | codes that claim to do one thing but do something else |
| virus | harmful program that piggybacks on others |
| worms | harmful items that use a computer network to spread |
| malicious code | programs written for bad or destructive purpose |
| program | written instruction in a computer language |
| exe | one common virus extension |
| vbs | file extension that stands for visual basic |
| steganography | technology that allows people to embed or hide data inside of other files like documents, pictures, or music files |
| hacking | process of breaking into a computer network |
| extension | explains the purpose of a file |
| spam | sending out mass mailings |
| flame | mail designed to make another person mad |
| netiquette | rules to follow when working online |
| file extension | string of letters at the end of a file name that identifies the file type |
| spim | spam delivered through Instant Messaging |
| hoax | attempt to fool someone by sending a false email |
| phishing | email sent pretending to be from a real business asking for personal information |
| malware | another name for spyware and adware-information can be sent to others about what you are doing online and send pop-up ads to your screen |
| attachment | file attached to an email-can be a document, picture, or a program |