Across
- 3. A tracking feature of Internet browsers that shows all the recent websites visited
- 6. To send information from your computer to another computer
- 8. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory
- 12. A hostile, strongly worded message that may contain obscene language
- 16. Willful and repeated harm inflicted through the medium of electronic text
- 20. A form of malicious code that displays unsolicited advertising on your computer
- 21. In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
- 22. The name a user selects to be identified on a computer, on a network, or in an online gaming forum
- 23. A secret word or number that must be used to gain access to an online service
- 25. “Live” time; the actual time during which something takes place
- 26. Rules or manners for interacting courteously with others online
- 27. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
- 28. Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
- 29. A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
Down
- 1. A piece of information about your visit to a website that some websites record automatically on your computer
- 2. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
- 4. Any Internet-related illegal activity
- 5. computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
- 7. To copy a file from one computer system to another via the Internet
- 9. A diary or personal journal kept on a website
- 10. Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
- 11. Refers to virtual sexual encounters between two or more persons
- 13. Methods individuals use to track, lure, or harass another person online
- 14. stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
- 15. Software that attempts to block malicious programs from harming your computer
- 17. A program, or set of instructions, that runs on a computer
- 18. To upload information to the Web
- 19. A location online that allows multiple users to communicate electronically with each other in real time
- 24. Any unsolicited e-mail, or junk mail
- 28. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program
