Digital Information Technology Chapter 17

1234567891011121314151617181920212223242526272829
Across
  1. 2. (UPS) device that protects computer systems and files against power surges and outages
  2. 6. password that is difficult for both computers and humans to crack
  3. 7. software designed to cause enough anxiety that the computer user leaps at the chance to opt for a poor choice
  4. 9. software used to detect and remove malicious software from a computer
  5. 14. software application that automatically performs Internet-based activities; also known as a web robot
  6. 16. computer code, often carried in a separate program, that can replicate itself to corrupt or otherwise harm either data files or the software used to process these files
  7. 18. small text file that websites put on the computer hard disk drive when a user visits the websites
  8. 19. activity by computer programmers to break into e-mails, websites, computer systems, and files of other computer users.
  9. 21. illegal act that involves stealing someone's personal information and using that information to commit theft or fraud
  10. 22. principles of what is right ad wrong that help people make decisions
  11. 23. code that functions similarly to a virus but is a standalone computer program that replicates itself in order to spread to other computers
  12. 24. phrase composed of real words on which a password is based
  13. 26. software that creates advertisements designed to drive the user to another website
  14. 27. device that joins two networks
  15. 28. attempt to obtain sensitive information by appearing as a harmless request
  16. 29. controls traffic to an individual machine
Down
  1. 1. manipulation or destruction of data found in cyberspace. It is unethical and can be illegal.
  2. 3. software that intentionally performs actions to disrupt the operation of a computer system, collect private information, or otherwise harm the computer or user.
  3. 4. online threat in which a virus or other malware infects the computer and takes control of your web browser
  4. 5. seemingly innocent program that conceals malicious code that will be executed
  5. 8. used to automatically route incoming e-mail to a specified inbox folder; also called rules
  6. 10. downnloading copyrighted material without permission of the copyright holder
  7. 11. collection of software that enables unauthorized access to a computer that is not normally permitted
  8. 12. location of temporary files
  9. 13. message or window that appears on top of or under the page you are viewing.
  10. 15. act of employing manipulative techniques designed to lure unwary computer users into launching an infected file or opening a link to an infected website
  11. 17. type of malware that encrypts files or blocks the user's access to programs until the user pays to unlock them
  12. 20. act of limiting access to information or removing information to prevent the information from being seen
  13. 23. (completely automated public Turing test to tell computers and humans apart) brief online test to determine whether the request for access comes from a computer or a human
  14. 25. software that secretly collects a user's data and behavior