1. Data
2. Cyber
3. Internet
4. Metaphysical
5. Publicity
Cyber
1. All have the same motive
2. Are people who maintain computers
3. May legally break into computers as long as they do not do any damage
4. Are people who are allergic to computers
5. Break into other people’s computers
Break into other people’s computers
1. Program delivery
2. Data snatching
3. Software privacy
4. Program looting
5. Data looting
Software privacy
1. Spam
2. Spoof
3. Cookie crumb
4. Sniffer script
5. Spill
Spam
1. Monitors
2. Overhead projection
3. Monitors and overhead projections
4. Touch screen kiosks
5. Loud speakers
Monitors and overhead projections
1. A mouse
2. A Printer
3. A sound format
4. A scanner
5. A mobile phone
A sound format
1. PC’s
2. Minicomputers
3. Mainframe computers
4. WANs
5. Super computers
PC’s
1. Speaker
2. Microphone
3. Talker
4. Mouse
5. Telephone
Microphone
1. Approximately one year
2. Approximately two years
3. Approximately five years
4. Approximately twenty-five years
5. Almost unlimited
Approximately five years
1. Default
2. CPU
3. Peripheral
4. User-friendly
5. Defaulter
Default