chapter 2
Across
- 3. a note taking and information management application
- 4. its positon relative to the sides of the page
- 5. A whole bunch of computer which are controlled by someone
- 8. the active of tricking someone.
- 10. make the word become thick
- 11. some specific marks to represent something
- 13. some characters to protect your information
- 14. a database application used to generate forms queries and reports from the data it stores.
- 15. the Web page links in a word document
- 17. Records internet usage
- 19. which can get into your computer and stole your personal information.
Down
- 1. the online mail
- 2. other people's opinions of your work
- 4. don't need human intervention
- 6. an email client with tools for organizing and searching email
- 7. Scrambles data using code
- 9. Record internet usage and passwords.
- 12. The file name of the document
- 16. User sent to phony website.
- 18. a word professor application used to produce professional looking documents such as letter resume and reports