EMPOWERMENT TECHNOLOGY

1234567891011121314151617181920
Across
  1. 2. a malicious program designed that is disguised as a useful program
  2. 5. acquires sensitive personal information like passwords and credits card details.
  3. 6. The user is able to see website differently than others which he can make his personal accounts
  4. 7. these are electronic or digital pictures or photographs you have saved in any local storage device.
  5. 10. a program designed to send you advertisement, mostly pop-ups.
  6. 11. displays simple animation
  7. 12. Numbers in excel
  8. 13. Sites that allow users to post their own news items or links to other news sources.
  9. 17. unwanted email mostly from bots or advertisers.
  10. 18. a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the user.
  11. 20. is the global system of interconnected computer networks that uses protocol
Down
  1. 1. a program that runs in the background without you knowing it
  2. 3. the do’s and don’ts of online communication
  3. 4. Pre-defined formulas that comes with excel
  4. 8. These are printable objects or materials that you can integrate in your document to enhance its appearance or allow you to have some tools to use for composing and representing ideas or messages
  5. 9. a malicious program designed to transfer from one computer to another in any means possible
  6. 14. an electronic device for storing and processing data
  7. 15. a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
  8. 16. a more complicated way of phishing where it exploits the DNS system.
  9. 19. It deals with the use of different communication technologies