Cyber
Across
- 2. Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
- 4. A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
- 6. Any unsolicited e-mail, or junk mail
- 8. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
- 11. A hostile, strongly worded message that may contain obscene language
- 13. Any Internet-related illegal activity
- 15. Methods individuals use to track, lure, or harass another person online
- 16. In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
- 18. A diary or personal journal kept on a website
- 21. To send information from your computer to another computer
- 22. Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
- 25. stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
- 27. A tracking feature of Internet browsers that shows all the recent websites visited
- 28. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
- 29. The name a user selects to be identified on a computer, on a network, or in an online gaming forum
Down
- 1. To upload information to the Web
- 2. A program, or set of instructions, that runs on a computer
- 3. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
- 5. To copy a file from one computer system to another via the Internet
- 7. A location online that allows multiple users to communicate electronically with each other in real time
- 9. A form of malicious code that displays unsolicited advertising on your computer
- 10. “Live” time; the actual time during which something takes place
- 12. computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
- 14. Willful and repeated harm inflicted through the medium of electronic text
- 17. Refers to virtual sexual encounters between two or more persons
- 19. Rules or manners for interacting courteously with others online
- 20. A piece of information about your visit to a website that some websites record automatically on your computer
- 23. Software that attempts to block malicious programs from harming your computer
- 24. A secret word or number that must be used to gain access to an online service
- 26. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory