CIW Review

123456789101112131415161718
Across
  1. 2. Can store contact information, help you take notes and keep track of appointments.
  2. 4. Collection of personal thoughts posted on a public Web site.
  3. 5. Security barrier that prevents unauthorized access to or from private networks.
  4. 7. Unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering the URL of a Web site into a browser.
  5. 9. Software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.
  6. 11. Small text files placed on Web site visitors' computers.
  7. 12. Tool that guides users step-by-step through a software installation process, or assists users of an application in creating documents and/or databases based on styles and templates.
  8. 14. Windows One or more small windows may suddenly open in front of the page you are viewing
  9. 15. List Published list of IP addresses known to be sources of spam
  10. 16. Encourage common sense and politeness, and to establish general rules for Internet etiquette.
  11. 17. Enable users to narrow their Internet search results by requiring or excluding keywords from the search criteria
  12. 18. encyclopedias and reference material that list additional titles. These additional titles can be either primary or secondary sources.
Down
  1. 1. Malicious program designed to damage computer systems, from stand-alone computers to entire networks.
  2. 3. Certificate Proves the identity of an individual or company over the Web.
  3. 6. The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data.
  4. 8. Computing Person's ability to use technology while "on the go."
  5. 10. URL The full path from the system root to a specific page or resource.
  6. 11. Completely Automated Public Turing Test to Tell Computers and Humans Apart
  7. 13. Junk e-mail that can clutter your Inbox