1.
details that allow someone to get in touch with you or an organization
2.
negative reviews, poor reviews, unfavorable reviews, or bad feedback
3.
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
4.
the highest possible rating on a 1-to-5 star scale, indicating exceptional quality, satisfaction, and a positive experience that exceeded customer expectations
5.
a digital file that creates an encrypted connection between a user's web browser and a website, ensuring that data exchanged remains private and secure
6.
any data that, if compromised, could lead to harm, loss, or unauthorized access
7.
false or inaccurate information
8.
the use of technology to harass, threaten, embarrass, or target another person
9.
a statement or legal document
10.
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
11.
a type of malicious software designed to block access to a computer system until a sum of money is paid.
12.
a type of malicious software (malware) that attaches itself to a legitimate program or file and, once executed by a user, replicates itself by inserting its code into other files and programs
13.
a crime where someone obtains and uses your personal information without your permission to commit fraud or other crimes