Matthew Prince
Across
- 2. A person who unknowingly gains access to someone's computer files.
- 4. Malicious software that is disguised as something good or useful. It technically isn't a virus.
- 6. specific software that you can try before purchase.
- 9. technology that prevents a user from gaining access to an inappropriate website, and
- 11. The "electronic" world perceived on a computer screen, this term if usedin opposition to the "real" world.
- 12. a software program, designed specifically to damage the files of a computer that recieves it.
Down
- 1. networks from an unauthorized user.
- 3. Applications designed to search for a virus and repair computer files.
- 5. any unwanted e-mail ( often of a commercial nature sent out in bulk )
- 7. formerly known as Web Log. A blog is a website that contains dated text entries. A blog can serve many purposes from newsletters to personal diaries to topical discussions.
- 8. a bully who goes online through cyber space to bully others online.
- 10. software that is used to view varieties of internet resources on the World Wide Web ( WWW ).
- 11. a small text file that identifies users' personal preferences and that allows a web site's server to extract your information from the database.