Edwin Martinez
Across
- 2. Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software.
- 4. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- 8. An unauthorized person who secretly gains access to computer file
- 10. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- 11. a piece of writing that has been copied from someone else and is presented as being your own work
- 12. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
- 1. A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- 3. ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- 5. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- 6. Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- 7. To renew or revitalize; To reload a webpage on the internet
- 9. A bully who operates online, in cyberspace; To bully online