Across
- 3. a self-replicating program able to propagate itself across a network, typically having a detrimental effect.
- 5. software intended to damage a computer, mobile device, computer system, or computer network, or to take partial control over its operation
- 6. a blustering, mean, or predatory person who, from a perceived position of relative power, intimidates, abuses, harasses, or coerces people, especially those considered unlikely to defend themselves
- 8. a computer program that searches documents, especially on the World Wide Web, for a specified word or words and provides a list of documents in which they are found.
- 9. the programs and other operating information used by a computer.
- 10. Also called Tro·jan .Computers. a nonreplicating computer program planted illegally in another program to do damage locally when the software is activated.
- 12. someone who stands up to a bully
- 16. a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
- 17. irrelevant or inappropriate messages sent on the internet to a large number of recipients.
- 19. the status of a literary work or an invention whose copyright or patent has expired or that never had such protection.
- 20. reasonable and limited use of copyrighted material so as not to infringe upon copyright
- 21. Usually the World Wide Web (except when used before a noun). a system of extensively interlinked hypertext documents: a branch of the internet.
- 22. websites and applications that enable users to create and share content or to participate in social networking.
- 24. Digital Technology. an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
- 25. a person who is present at an event or incident but does not take part.
- 28. a person who develops the skills and knowledge to effectively use the internet and other digital technology, especially in order to participate responsibly in social and civic activities
- 29. a person who makes a deliberately offensive or provocative online post.
- 34. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- 36. a representation of a facial expression such as:-) (representing a smile), formed by various combinations of keyboard characters and used to convey the writer's feelings or intended tone
- 37. an identification used by a person with access to a computer, network, or online service.
- 38. Computers. software that is installed surreptitiously and gathers information about an internet user's browsing habits, intercepts the user's personal data, etc., transmitting this information to a third party
- 39. the correct or acceptable way of communicating on the internet.
- 41. an icon or figure representing a particular person in video games, internet forums, etc.
Down
- 1. a dishonest scheme; a fraud.: "an insurance scam".
- 2. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- 4. false news stories, often of a sensational nature, created to be widely shared or distributed for the purpose of generating revenue, or promoting or discrediting a public figure, political movement, company, etc
- 7. the address of a web page.
- 11. an application, especially as downloaded by a user to a mobile device.
- 13. one's unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device
- 14. tools, machinery, and other durable equipment.
- 15. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 18. the practice of taking someone else's work or ideas and passing them off as one's own
- 19. the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users for purposes of identity theft
- 23. to bully online by sending or posting mean, hurtful, or intimidating messages, usually anonymously
- 26. the quality of being trusted and believed in.
- 27. a person who uses computers to gain unauthorized access to data.
- 30. a set of related web pages located under a single domain name, typically produced by a single person or organization.
- 31. a packet of data sent by a web server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.
- 32. copy (data) from one computer system to another, typically over the internet.
- 33. a secret word or phrase that must be used to gain admission to something
- 35. the fraudulent appropriation and use of someone's identifying or personal data or documents, as a credit card.
- 40. transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
