Computer Literacy Key Terms

123456789101112131415161718192021
Across
  1. 2. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory. A trojan is a variation that allows unauthorized users access to the computer, from which they can send infected e-mails or spam
  2. 5. To send information from your computer to the cloud or internet
  3. 9. A tracking feature of Internet browsers that shows all the recent websites visited.
  4. 12. A term for the actual computer equipment and related machines or computer parts.
  5. 14. A hostile, strongly worded message that may contain obscene language.
  6. 16. Methods individuals use to track, lure, or harass another person online
  7. 18. A program that lets you find, see, and hear material on web pages. Popular browsers include safari, Microsoft inIernet Explorer, Firefox, and Google chrome
  8. 19. A giant collection of computer networks that connects people and information all over the world
  9. 20. A piece of information about your visit to a website that some websites record automatically on your computer. By using a cookie, a website operator can determine a lot of information about you and your computer. cookies are not always bad. For example, a cookie remembers that you prefer aisle seats in the front of the plane
  10. 21. Refers to the techniques sexual predators use to get to know and seduce their victims in preparation for sexual abuse
Down
  1. 1. A list of friends a user interacts with online through various media such as instant messaging (IM) and chat
  2. 3. Any unsolicited e-mail, or junk mail. Most spam is either a money scam or sexual in nature. Internet service Providers, e-mail software, and other software can help block some, but not all, spam.
  3. 4. stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
  4. 6. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
  5. 7. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the spyware program. The programs typically will track computer use and create numerous pop-up ads. in some instances, the spyware can damage the computer and facilitate identity theft
  6. 8. To copy a file from one computer system to another via the Internet (usually your computer or mobile device).
  7. 10. A form of malicious code that displays unsolicited advertising on your computer
  8. 11. Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
  9. 13. A security system is usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
  10. 15. Any Internet-related illegal activity
  11. 17. A saved link to a website that has been added to a list of saved links or favorite sites (i.e., “Favorites”) that you can click on directly, rather than having to retype the address when revisiting the site