BT Internet Safety Vocab Review

12345678910
Across
  1. 4. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory.
  2. 5. Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
  3. 6. Computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
  4. 9. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication.
  5. 10. Any unsolicited e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.
Down
  1. 1. Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).
  2. 2. Methods individuals use to track, lure, or harass another person online.
  3. 3. In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money. E-mail scams, spyware, and viruses are among the most typical methods for stealing someone’s identity.
  4. 7. A hostile, strongly worded message that may contain obscene language.
  5. 8. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the spyware program.