Jessica Perez

1234567891011
Across
  1. 1. – An unauthorized person who secretly gains access to computer files.
  2. 2. NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
  3. 3. – Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software
  4. 4. – software used to view various kinds of Internet resources found on the Web.
  5. 6. -- A bully who operates online, in cyberspace; To bully online
  6. 8. - a list of citations that appear at the end of a paper, article, chapter or book.
  7. 11. – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
Down
  1. 1. - A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  2. 5. or graphics that, when clicked, will connect the user to a new web page or another place on the same page
  3. 7. – Originally known as Web Log. Blogs are websites that contains dated text e citations that appear at the end of a paper, article, chapter or bookntries,
  4. 9. – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
  5. 10. – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.