Malicious software program that replicates itself.
Virus
The use of electronic communication to bully a person.
Cyberbullying
What are the rules or guidelines set within an organization for using the Internet?
Acceptable Use Policy (AUP)
A software application that allows users to store digital currency and make online payments.
Digital Wallet
The simulation of human intelligence processes by machines.
Artificial Intelligence
A combination of upper and lowercase letters, numbers, and symbols.
Strong Password
What is the term for polite online behavior?
Netiquette
What is a system of laws that grants creators exclusive rights to their original works?
Copyright law
What is the buying and selling of goods and services over the internet called?
E-commerce
General term for software that is designed to harm computer systems.
Malware
What is the term for the gap between those who have access to technology and those who don't?
Digital Divide
A security process that requires two forms of identification to access an account.
two-factor authentication
Criminal activities carried out electronically, such as hacking and identity theft.
Cybercrime
What is the right to control how personal information is collected, used, and shared?
Right to privacy/Data Privacy
Term for a computer program that automatically collects information about a user's online activities.
Spyware