Chapter2

123456789101112131415161718
Across
  1. 2. which can get into your computer and stole your personal information.
  2. 5. a database application used to generate forms queries and reports from the data it stores.
  3. 8. its positon relative to the sides of the page
  4. 10. some specific marks to represent something
  5. 11. A whole bunch of computer which are controlled by someone
  6. 14. The file name of the document
  7. 15. an email client with tools for organizing and searching email
  8. 17. a word professor application used to produce professional looking documents such as letter resume and reports
  9. 18. User sent to phony website.
Down
  1. 1. the Web page links in a word document
  2. 2. Record internet usage and passwords.
  3. 3. the online mail
  4. 4. the active of tricking someone.
  5. 6. don't need human intervention
  6. 7. some characters to protect your information
  7. 9. other people's opinions of your work
  8. 12. Scrambles data using code
  9. 13. make the word become thick
  10. 15. a note taking and information management application
  11. 16. Records internet usage