Hacker - Who can get access to you computer with no permission?, Trolling - Posting internet messages meant to intentionally anger or frustrate in order to provoke reactions from others., Flaming - Online fights using electronic messages with angry and vulgar language., Spam - Unwanted e-mail sent out in bulk., Phishing - A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail., Malware - Software that is intended to damage or disable computers and computer systems., Virus - A piece of code that is capable of copying itself typically to corrupt the computer system or destroying data., Trojan Horse - A program that appears desirable but actually contains something harmful., Worm - Destructive programs that replicate themselves to use up all the remaining free hard disk space., Spyware - Software that enables a user to obtain information about another's computer activities without the users permission., Ransomware - Warns users that they are infected, and users have to pay to get it fixed., Hacking - Invading someone else's computer, usually for personal gain or just for the satisfaction of invading someone else's computer., Cyberbullying - The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature., Cybercrime - Online or Internet-based illegal acts., Digital Footprint - All of the information about a person that can be found online., Avatar - A person's online representation as a character, whether in the form of a 2-D or 3-D image or simply through text.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?