Digital Information Technology Chapter 17
Across
- 2. (UPS) device that protects computer systems and files against power surges and outages
- 6. password that is difficult for both computers and humans to crack
- 7. software designed to cause enough anxiety that the computer user leaps at the chance to opt for a poor choice
- 9. software used to detect and remove malicious software from a computer
- 14. software application that automatically performs Internet-based activities; also known as a web robot
- 16. computer code, often carried in a separate program, that can replicate itself to corrupt or otherwise harm either data files or the software used to process these files
- 18. small text file that websites put on the computer hard disk drive when a user visits the websites
- 19. activity by computer programmers to break into e-mails, websites, computer systems, and files of other computer users.
- 21. illegal act that involves stealing someone's personal information and using that information to commit theft or fraud
- 22. principles of what is right ad wrong that help people make decisions
- 23. code that functions similarly to a virus but is a standalone computer program that replicates itself in order to spread to other computers
- 24. phrase composed of real words on which a password is based
- 26. software that creates advertisements designed to drive the user to another website
- 27. device that joins two networks
- 28. attempt to obtain sensitive information by appearing as a harmless request
- 29. controls traffic to an individual machine
Down
- 1. manipulation or destruction of data found in cyberspace. It is unethical and can be illegal.
- 3. software that intentionally performs actions to disrupt the operation of a computer system, collect private information, or otherwise harm the computer or user.
- 4. online threat in which a virus or other malware infects the computer and takes control of your web browser
- 5. seemingly innocent program that conceals malicious code that will be executed
- 8. used to automatically route incoming e-mail to a specified inbox folder; also called rules
- 10. downnloading copyrighted material without permission of the copyright holder
- 11. collection of software that enables unauthorized access to a computer that is not normally permitted
- 12. location of temporary files
- 13. message or window that appears on top of or under the page you are viewing.
- 15. act of employing manipulative techniques designed to lure unwary computer users into launching an infected file or opening a link to an infected website
- 17. type of malware that encrypts files or blocks the user's access to programs until the user pays to unlock them
- 20. act of limiting access to information or removing information to prevent the information from being seen
- 23. (completely automated public Turing test to tell computers and humans apart) brief online test to determine whether the request for access comes from a computer or a human
- 25. software that secretly collects a user's data and behavior