chapter 2

12345678910111213141516171819
Across
  1. 3. a note taking and information management application
  2. 4. its positon relative to the sides of the page
  3. 5. A whole bunch of computer which are controlled by someone
  4. 8. the active of tricking someone.
  5. 10. make the word become thick
  6. 11. some specific marks to represent something
  7. 13. some characters to protect your information
  8. 14. a database application used to generate forms queries and reports from the data it stores.
  9. 15. the Web page links in a word document
  10. 17. Records internet usage
  11. 19. which can get into your computer and stole your personal information.
Down
  1. 1. the online mail
  2. 2. other people's opinions of your work
  3. 4. don't need human intervention
  4. 6. an email client with tools for organizing and searching email
  5. 7. Scrambles data using code
  6. 9. Record internet usage and passwords.
  7. 12. The file name of the document
  8. 16. User sent to phony website.
  9. 18. a word professor application used to produce professional looking documents such as letter resume and reports