dfg

1234567891011121314151617181920212223242526272829
Across
  1. 3. A tracking feature of Internet browsers that shows all the recent websites visited
  2. 6. To send information from your computer to another computer
  3. 8. A self-replicating software program that typically arrives through e-mail attachments and which multiplies on the hard drive, quickly exhausting the computer’s memory
  4. 12. A hostile, strongly worded message that may contain obscene language
  5. 16. Willful and repeated harm inflicted through the medium of electronic text
  6. 20. A form of malicious code that displays unsolicited advertising on your computer
  7. 21. In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money
  8. 22. The name a user selects to be identified on a computer, on a network, or in an online gaming forum
  9. 23. A secret word or number that must be used to gain access to an online service
  10. 25. “Live” time; the actual time during which something takes place
  11. 26. Rules or manners for interacting courteously with others online
  12. 27. A security system usually made up of hardware and software used to block hackers, viruses, and other malicious threats to your computer
  13. 28. Cell phone, computer and other mobile device users—often teens and ‘tweens’—create and exchange provocative messages and nude, sexual images of themselves using their cell phone’s built-in digital camera and text messaging capabilities
  14. 29. A method of sending short messages (also called SMS) between mobile phones and other computer-enabled devices
Down
  1. 1. A piece of information about your visit to a website that some websites record automatically on your computer
  2. 2. A type of online fraud, where someone tries to trick the victim into revealing sensitive details, such as a username, password, or credit card details by masquerading as a trustworthy entity in electronic communication
  3. 4. Any Internet-related illegal activity
  4. 5. computers maintain a record of all website visits and e-mail messages, leaving a trail of the user’s activity in cyberspace
  5. 7. To copy a file from one computer system to another via the Internet
  6. 9. A diary or personal journal kept on a website
  7. 10. Online communities, also known as social networks, where people share information about themselves, music files, photos, etc
  8. 11. Refers to virtual sexual encounters between two or more persons
  9. 13. Methods individuals use to track, lure, or harass another person online
  10. 14. stands for malicious software or code, which includes any harmful code—trojans, worms, spyware, adware, etc.—that is designed to damage the computer or collect information
  11. 15. Software that attempts to block malicious programs from harming your computer
  12. 17. A program, or set of instructions, that runs on a computer
  13. 18. To upload information to the Web
  14. 19. A location online that allows multiple users to communicate electronically with each other in real time
  15. 24. Any unsolicited e-mail, or junk mail
  16. 28. A wide variety of software installed on people’s computers, which collects information about you without your knowledge or consent and sends it back to whoever wrote the program