Across
- 2. Can store contact information, help you take notes and keep track of appointments.
- 4. Collection of personal thoughts posted on a public Web site.
- 5. Security barrier that prevents unauthorized access to or from private networks.
- 7. Unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
- 9. Software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
- 11. Small text files placed on Web site visitors' computers.
- 12. Tool that guides users step-by-step through a software installation process, or assists users of an application in creating documents and/or databases based on styles and templates.
- 14. Windows One or more small windows may suddenly open in front of the page you are viewing
- 15. List Published list of IP addresses known to be sources of spam
- 16. Encourage common sense and politeness, and to establish general rules for Internet etiquette.
- 17. Enable users to narrow their Internet search results by requiring or excluding keywords from the search criteria
- 18. encyclopedias and reference material that list additional titles. These additional titles can be either primary or secondary sources.
Down
- 1. Malicious program designed to damage computer systems, from stand-alone computers to entire networks.
- 3. Certificate Proves the identity of an individual or company over the Web.
- 6. The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data.
- 8. Computing Person's ability to use technology while "on the go."
- 10. URL The full path from the system root to a specific page or resource.
- 11. Completely Automated Public Turing Test to Tell Computers and Humans Apart
- 13. Junk e-mail that can clutter your Inbox
