days puzzle.

123456789101112131415161718192021222324
Across
  1. 1. The use of science to invent useful things or to solve problems.
  2. 4. the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
  3. 5. a person who uses computers to gain unauthorized access to data.
  4. 6. Profile information gleaned from a customer's use of a Web site
  5. 7. A program that will detect, protect and fix your computer if it has viruses.
  6. 10. Networking the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
  7. 11. A program that copies itself and spreads to other computers through networks.
  8. 12. Software that pretends to be something fun or useful, so the user downloads it, but actually it does something else.
  9. 14. logging When all the keys you press on your keyboard is recorded and sent back to somebody like a hacker.
  10. 15. messages a message sent via the internet that appears on the recipient's screen as soon as it is transmitted.
  11. 16. A program that "infects" your computer.
  12. 20. A method of computer security that protects a computer from harmful outside connections.
  13. 23. when someone builds a relationship, trust and emotional connection with a child or young person so they can manipulate, exploit and abuse them
  14. 24. Protecting yourself when using something that could be harmful or dangerous to you.
Down
  1. 2. messages distributed by electronic means from one computer user to one or more recipients via a network
  2. 3. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
  3. 8. describes the rules of conduct for respectful and appropriate communication on the internet.
  4. 9. Computer software that secretly records information about the way you use your computer.
  5. 13. Predator someone that seeks contact with children and adolescents on the internet for abusive purposes
  6. 17. irrelevant or inappropriate messages sent on the internet to a large number of recipients.
  7. 18. the action or practice of sending sexually explicit photographs or messages via mobile phone.
  8. 19. the practice of taking someone else's work or ideas and passing them off as one's own.
  9. 21. Child Exploitation and Online Protection Centre
  10. 22. the unauthorized use or reproduction of another's work.