Web Safety Tools

1234567891011121314151617181920212223
Across
  1. 3. someone who sends ,posts , or shares negative things about another person
  2. 4. use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions
  3. 5. the programs and other operating info used by a computer
  4. 8. Hats good hackers
  5. 12. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  6. 13. a secret word or randomized characters used t get into something
  7. 15. computer programing system
  8. 19. the machines, wiring, and other physical components of a computer or other electronic system
  9. 20. a piece of code that is capable of copying itself and corrupting the system or destroying data
  10. 21. the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
  11. 22. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  12. 23. is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list and is sent for commercial purposes
Down
  1. 1. microcomputer and software
  2. 2. a device that forwards data packets to the appropriate parts of a computer network
  3. 4. internet users who exploit children and teens for sexual and violent purposes
  4. 6. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access
  5. 7. interconnected computing devices that can exchange data and share resources with each other
  6. 9. designed to detect and destroy computer
  7. 10. information that has been translated into a form that is efficient for movement or processing
  8. 11. computer expert that can get personal info
  9. 12. Theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain
  10. 14. an action or practice of sending sexually explicit photographs and/or messages
  11. 16. the practice of taking someone else's work or ideas and passing them off as one's own
  12. 17. Hats bad hackers
  13. 18. random-access memory