BT Internet Safety Vocab Review
Across
- 4. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory.
- 5. Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
- 6. Computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
- 9. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication.
- 10. Any unsolicited e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.
Down
- 1. Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).
- 2. Methods individuals use to track, lure, or harass another person online.
- 3. In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money. E-mail scams, spyware, and viruses are among the most typical methods for stealing someone’s identity.
- 7. A hostile, strongly worded message that may contain obscene language.
- 8. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the spyware program.