Across
- 5. (File Transfer Protocol) - Software that will transfer entire files from one computer to another, for viewing or other purposes.
- 7. - The unauthorized copying of software, movies, recorded music, CDs, DVDs, etc.
- 8. - Tagging is used on social networking websites such as Facebook to enable users to identify the people that appear in photos they upload.
- 9. - Cloud computing refers to the ability for people and organisations to access files, software, data and other services via the internet that are hosted remotely, typically by a third party organisation. An example would be an internet service which allows you to upload and store your files (e.g. audio, video and documents) online and access them later.
- 12. - The worldwide, interconnected system of computer networks.
- 15. - A section on some Web sites that displays messages posted by users.
- 16. - Software that is secretly installed on a computer and monitors use of the computer in some way without the users' consent. Most spyware tries to get the user to view advertising and/or particular web pages. Some spyware also sends information about the user to another machine over the internet. Spyware is usually installed without a user's knowledge as part of the installation of other software, especially software such as music sharing software obtained via download.
- 17. rooms - Internet service provided area where users can talk instantly with one another online by sending short messages. Different rooms may be "entered" to discuss specific topics.
- 19. -help you to find a location or to let others know where you are located. This technology can be used to find people, or business locations like restaurants. Location-based services are also used by social networking services to help you provide located-based information (check-ins) to status updates or photos.
- 22. - Is to listen into a chat room or online group without participating. Newcomers are encouraged to lurk for a while as they get the feel of a site and how it operates.
- 27. - Is the use of either a hardware device installed on a keyboard or spyware software to record every keystroke (the sequence of keys pushed on your keyboard) on the computer. A keylogger records everything the user types in, including emails, log-in names, passwords, credit card numbers and/or bank account websites in order to steal the information.
- 28. - A web of interconnected people who directly or indirectly interact with or influence the student and family. May include but is not limited to family, teachers and other school staff, friends, neighbors, community contacts, and professional support.
- 29. - An identity theft scam in which criminals send out spam that imitates legitimate correspondence. The fake messages often link to websites which are made to look like the sites of respected companies. You are asked to enter personal information for authentication or confirmation purposes but in reality, you are giving personal information to criminals. Be aware that phishers also use the phone to hunt for information.
- 30. - Software that allows users to create, edit, and link web pages easily. Wikis are often used to create collaborative websites and to power community websites and knowledge base. One of the best known wikis is Wikipedia.
- 33. - Process/art of taking existing digital content (e.g. music, video) and editing and recombining it to produce new content. Remixing is the gray area between copyright and fair use.
- 36. - Is the name for a person used specifically for the online world. It is sometimes referred to as a "handle." When you sign up for a service such as gmail or a chat room, you are required to create a unique identifier—a "username"— that helps to protect your identity.
- 37. - Messages sent from one person to another via computer. Generally text, but can include attached files of documents, graphics, sounds, or videos.
- 38. - A website address saved in your browser so you can access it easily later.
- 40. (or P2P) - Networks used for sharing content such as music, video, data or anything in digital format.
- 41. - Occurs when an adult takes deliberate actions to befriend and establish an emotional connection with a child in order to lower the child's inhibitions. It may include situations where adults pose as children in chat rooms or social networking sites and 'befriend' children in order to make arrangements to meet with them in person.
- 43. - Usually the first page of a website.
- 44. - An environment that controls the user's access to Web content and services. In effect, the walled garden directs the user's navigation within a website (blog), to allow access to a selection of material, or prevent access to other material.
- 46. - Trolling is when a user intentionally causes distress, anger or argument in an online public forum for the purpose of disturbing other users. Individuals who partake in trolling seek an emotional response from others, whether with malicious or humorous intent.
- 48. - Websites that allow users to consume information. The information flow is one way in that users cannot produce information on a Web 1.0 site.
- 49. - Sequence of printable characters to convey an emotion, such as a smiley face :-).
- 50. - A software program or script designed to destroy, modify, or cause other problems with a computer or software program. Viruses can arrive as e-mail attachments, with software installations or on discs. Installing and keeping current an anti-virus program can greatly reduce the risks to your computer.
Down
- 1. - To copy a file from a website or e-mail attachment onto the computer you are using.
- 2. - Insulting or nasty remarks directed at someone through e-mail or chat rooms. A "flame war" is when an online discussion degenerates into a series of personal attacks.
- 3. - Unsolicited and/or inappropriate email.
- 4. - URLThe unique address of an internet page.
- 6. Browsers hold copies of recently visited websites and web files in disk memory. This disk memory space is called the cache.
- 7. - A browser window that opens in addition to the main window. Frequently contains bothersome advertising and may be difficult to get rid of. Pop-ups may open automatically without input from the user, and closing one may open several more unwanted windows.
- 10. (DoS) - DoS attacks involve cybercriminals using a variety of techniques to inundate an internet server with enormous amounts of 'junk' data in order to consume its resources. This can result in normal web users being unable to access a website or experiencing very slow access speeds.
- 11. - ...stands for Really Simple Syndication, which is an internet based technology that allows the distribution of Web content through an RSS reader. Using RSS, news articles, press releases, and other content can be gathered together and distributed via news feeds on an RSS server connected to the internet.
- 13. - A graphic/photo icon to represent a participant in chat and games.
- 14. - In instant messaging (IM), or on cell phones with text display, a list of people a user wants to communicate with. The list can be used to see who is offline or online.
- 16. - Pretending to be someone else.
- 18. - The unique name that identifies an internet site. Domain names have 2 parts, separated by a dot. The part on the left is the most specific, and the part on the right is the most general.
- 20. A computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and make announcements without the people being connected to the computer at the same time.
- 21. - Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the internet, interactive and digital technologies or mobile phones. Cyberbullying has to have a minor on both sides, or at least have been instigated by a minor against another minor. Once adults become involved, it is cyber-harassment or cyberstalking.
- 23. - A small file placed on your computer by a website you visit that stores information about you. Cookies can be useful because they can allow you to skip entering information on reputable sites every time you visit. While cookies will not act maliciously on your computer system, they can compromise your privacy.
- 24. - Technology that notifies a user when a friend is online, allowing them to "converse" by exchanging text messages. IM or text messaging has become a term associated with messaging by cell phone as well.
- 25. - The informal rules of online courtesy.
- 26. - A system, such as Google, for searching for information on the internet.
- 31. - Used to describe the entire range of internet resources available through service providers.
- 32. - Software (Ex: Internet Explorer, Firefox, Chrome and Safari) used to look at various kinds of internet resources.
- 34. - A simple video camera that sits near your computer and sends live or recorded video as well as still photos.
- 35. - A private network inside a company or organization that is used to access internal documents and information.
- 38. - A journal that is available online. The activity of "posting" to a blog is "blogging" and someone who keeps a blog is a "blogger." Blogs are typically updated frequently, with posts appearing in chronological order with the most recent at the top. Thanks to the availability of blogging software that requires little or no technical background, creating and maintaining a blog is very easy to do.
- 39. - Posting or transmitting an audio file to be downloaded and viewed/heard by other internet users either on a computer or MP3 player. Note: You do not need an iPod to do podcasting.
- 42. - Websites that allow users to produce as well as consume information (i.e., blogs and wikis).
- 45. - A technically sophisticated computer user who enjoys exploring computer systems and programs. Activities can be benign or malicious.
- 47. - Sexting refers to the sending of provocative photos, messages, or videos, generally using a mobile phone. It can also include posting this type of material online.
- 51. - A company that provides customers with a connection to the internet and may provide e-mail services.
