A. access B. ethics C. ownership D. security
A. cookies B. histories C. profiles D. web bugs
A. history file B. menu C. tool bar D. firewall
A. detect B. insert C. privacy D. sleep
A. access approval B. firewall C. online identity D. phish
A. antispies B. crackers C. cyber traders D. identity thieves
A. Trojan horses B. viruses C. web bugs D. zombies
A. cyberbullying B. online harassment C. social networking discrimination D. unethical communication
A. antivirus program B. communication gate C. firewall D. spyware removal program
ACT B. DRM C. VPN D. WPA2