| A | B |
| A computer program written to alter the way a computer operates without the permission of the user | Virus |
| Has the appearance of being a useful and desired function, but secretly it performs undesired functions | Trojan Horse Virus |
| This unwanted program replicates itself after it has entered the computer. | Worm Virus |
| This virus loads each time the computer is restarted. | Bootsector Virus |
| An application virus that attacks programming language, allowing it to target documents such as Microsoft Word or Excel. | Macrovirus |
| This virus is programmed to initiate when a certain set of data is input into the computer. | Logic Bomb |
| When people try to get your personal information through bogus sites that are pretending to be legitimate sites. | Phishing |
| When people try to gain unauthorized access to your computer system without your knowledge. | Hacking |
| The common name of software that is given to the user with advertisements embedded in it. | Adware |
| Any software that covertly gathers user information through the user's Internet connection without his or her knowledge | Spyware |
| Is virus protection hardware or software? | Software |
| Software that provides a barrier protection between networks. | Firewall |
| This control limits the types of sites that can be viewed. | Filter |
| This software IS NOT copyrighted and can be used for free at any time. | Public Domain |
| This software IS copyrighted but can be used for free at any time. | Freeware |
| This software IS copyrighted but can be used for free for a limited time and then must be purchased. | Shareware |
| True or false: Adware, Viruses, and Spyware are all types of Malware. | True |
| A virus that lurks in the computer, waiting for a specific date/time to activate it, what type of virus is it. | Time Bomb |