Across
- 1. The use of science to invent useful things or to solve problems.
- 4. the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.
- 5. a person who uses computers to gain unauthorized access to data.
- 6. Profile information gleaned from a customer's use of a Web site
- 7. A program that will detect, protect and fix your computer if it has viruses.
- 10. Networking the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
- 11. A program that copies itself and spreads to other computers through networks.
- 12. Software that pretends to be something fun or useful, so the user downloads it, but actually it does something else.
- 14. logging When all the keys you press on your keyboard is recorded and sent back to somebody like a hacker.
- 15. messages a message sent via the internet that appears on the recipient's screen as soon as it is transmitted.
- 16. A program that "infects"your computer.
- 20. A method of computer security that protects a computer from harmful outside connections.
- 23. when someone builds a relationship, trust and emotional connection with a child or young person so they can manipulate, exploit and abuse them
- 24. Protecting yourself when using something that could be harmful or dangerous to you.
Down
- 2. messages distributed by electronic means from one computer user to one or more recipients via a network
- 3. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- 8. describes the rules of conduct for respectful and appropriate communication on the internet.
- 9. Computer software that secretly records information about the way you use your computer.
- 13. Predator someone that seeks contact with children and adolescents on the internet for abusive purposes
- 17. irrelevant or inappropriate messages sent on the internet to a large number of recipients.
- 18. the action or practice of sending sexually explicit photographs or messages via mobile phone.
- 19. the practice of taking someone else's work or ideas and passing them off as one's own.
- 21. Child Exploitation and Online Protection Centre
- 22. the unauthorized use or reproduction of another's work.
