| A | B |
| Denial of Service Attack | mass emails flood a target site to bring it down |
| Virus | A program that attaches itself to other programs |
| Trojan Horse | A program appears to be useful, but actually is destructive |
| Spyware | A program that secretly collects information |
| Cybercrime | On-line illegal acts |
| Spam | Bulk advertising email |
| ID Theft | Obtaining personal information in order to impersonate someone else |
| Firewall | A device that limits Internet access into and out of a network |
| Zombie | Computer that a hacker uses to send emails through |
| Intellectual Property | Unique and original works |
| Netiquette | The code of acceptable behaviour on the Internet |
| Technophobia | Fear of modern technology |
| Encryption | The conversion of a message into a secret code |
| Digital Divide | The gap between those who have access to the Internet and those who don't |
| Hacker | Someone who gains unauthorised access to a computer system |
| Ergonomics | The study of designing computer equipment for health and safety |
| Open Source Software | Software that is freely available to anyone |
| Telecommuting | Working from home using a pc |
| Patch | A minor change to correct a program |
| E-commerce | Business transactions over the Internet |