Communication Technology Crossword

12345678910111213141516
Across
  1. 3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  2. 5. to a large number of recipients.
  3. 6. An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely
  4. 7. Irrelevant or inappropriate messages sent on the
  5. 10. A link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
  6. 12. incoming and outgoing network traffic.
  7. 13. A personal website or social media account where a person regularly posts short videos.
  8. 14. Any piece of equipment that you can physically touch.
  9. 16. A point where two systems, subject, organizations meet and interact.
Down
  1. 1. software That enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. 2. A network security device that monitors and
  3. 4. a limited area.
  4. 7. The programs and other operating information used by a computer.
  5. 8. the address of a web page
  6. 9. A number of interconnected computers, machines and operations.
  7. 11. A local or restricted communications network, especially a private network created using world wide web software.
  8. 15. A computer network that interconnects computers