Information Technology (IT) - Answers The study or use of systems for storing, retrieving, and sending
information
Cybercrime - Answers A criminal act committed primarily through the use of a computer system
Phishing - Answers Sending emails to lure people into revealing their personal information or to take an
action
Hacking - Answers unauthorized access, modification, or use of an electronic device or some element of
a computer system
Social Networking - Answers process by which we make connections with others
social media - Answers online tools and sites that allow netoworking
Cloud Storage - Answers allows you to save files in storage and then access them on the Cloud
Cloud Computing - Answers is a type of Internet-based computing that provides shared computer
processing resources and data to computers and other devices on demand
intellectual property - Answers an idea, invention, or process that derives from the work of the mind or
intellect
copyright - Answers protection given to the creator of songs, computer programs, books, and other
creative works
copyright infringement - Answers When a copyrighted work is reproduced, distributed, performed, or
publicly displayed work without the permission of copyright owner
patent - Answers creates protection for someone who invents a new product or process
Trademark - Answers a word, phrase, logo, shape or sound that identifies a source of goods or services
that must be protected by an organization
Digital Rights Management - Answers a strategy designed to prevent illegal distribution of movies,
music, and other digital content
public domain - Answers A work of authorship that is not under copyright protection and can be used
freely without permission
plagarism - Answers taking someones ideas or writing and offering them as your own
digital divide - Answers The gap between those who have access to the Internet and technology and
those who do not
, mobile commerce - Answers The process of buying, selling, or exchanging products, services, or
information via phone
E-commerce (electronic commerce) - Answers The process of buying, selling, or exchanging products,
services, or information via internet
black hat hackers - Answers A hacker that breaks into a system for malicious reasons
white hat hackers - Answers A person who hacks into a system for non-malicious purposes
Denial of service attack - Answers attack which a botnet overwhelms websites, mail servers, or other
internet locations and a user cannot access the site
Spam - Answers irrelevant or inappropriate messages sent on the Internet to a large number of
recipients
malware - Answers malicious software
Spyware - Answers malware that can monitor and record user activities
computer cookies - Answers A text file which a website can store on its visitors' hard drives. Can
remember passwords, tracks number of visitors
identity theft - Answers when a criminal or group uses the identity of unknown person
Social Engineering - Answers manipulation of people into releasing information or performing a task that
violates security protocols
virus - Answers software that attaches or adds itself to other software; can replicate itself
anti-virus software - Answers a program that finds and removes viruses from a computer
Passwords - Answers a method of controlling access to confidential patient information.
Choose strong passwords, change passwords periodically, do not use the same password for multiple
purposes
privacy policy - Answers Document that tells how personal data collected by a company will be used
artificial intelligence - Answers the branch of computer science that attempts to develop computers that
mimic human thought and behavior
virtual reality - Answers Illusion of reality through the use of software and perception changing devices
Augmented reality - Answers the combination of a "real" objects overlaid with data, images, etc. that
are not real
Excel - Answers a spreadsheet written or tailored to meet specific needs