Web Safety & Ethics Vocabulary

1234567891011121314151617181920212223
Across
  1. 2. unauthorized reproduction or distribution of copyrighted materials
  2. 3. granted legal right which gives the creator of an original work exclusive rights
  3. 8. Malicious software designed to cause damage or gain unauthorized access to your account or computer.
  4. 9. A small bit of data sent by a website you visit to your computer to remember you when you go back.
  5. 11. Software that attempts to block malicious programs from harming your computer.
  6. 13. method through which hackers can gain access to a computer through email
  7. 15. someone who is an expert at computer programming and who is able to solve computer problems
  8. 16. a program written to cause harm or to a computer.
  9. 18. crime which occurs when someone’s personal and financial information is stolen
  10. 21. computer device which forwards data packets from one network to another
  11. 22. Malware that uses pop-ups to display ads.
  12. 23. use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Down
  1. 1. adult Internet user who uses social networking sites to approach and eventually hurt other people
  2. 4. Someone who sees what is happening between a bully and a victim
  3. 5. use of other people’s words, thoughts or ideas without crediting the source
  4. 6. collection of computers controlled by users other than their owners to perform automated tasks over the Internet
  5. 7. keeps data private within a public network
  6. 10. hacker who tries to illegally gain access to others' computer for financial gain
  7. 12. Malware that secretly records you online activity, user ids, passwords, and other personal info.
  8. 14. hacker who tries to solve computer issues
  9. 17. creation, distribution or forwarding of a message or photo which includes sexually explicit materials digitally.
  10. 19. exception to copyright infringement
  11. 20. A network security system to help prevent outside intrusions like hackers, viruses, or other malicious software into the system.